메뉴 건너뛰기




Volumn , Issue , 2005, Pages 533-543

Agent-based modeling and simulation of cyber-warfare between malefactors and security agents in Internet

Author keywords

Agent based modeling and simulation; Computer network attacks; Information assurance

Indexed keywords

ACTION PLAN; AGENT-BASED MODELING AND SIMULATION; COMPUTER NETWORK ATTACKS; DISTRIBUTED DENIAL OF SERVICE; INFORMATION ASSURANCE; JOINT INTENTION; MODELING AND SIMULATION; NETWORK HOSTS; SECURITY AGENTS; SOFTWARE PROTOTYPES;

EID: 84856542536     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (30)

References (33)
  • 10
    • 84958977084 scopus 로고    scopus 로고
    • A stochastic model for intrusions. Recent advances in intrusion detection
    • Proceedings. Lecture Notes in Computer Science Springer Verlag
    • Goldman, R.P. 2002. "A Stochastic Model for Intrusions. Recent Advances in Intrusion Detection". Fifth International Symposium. RAID 2002. Proceedings. Lecture Notes in Computer Science, V.2516. Springer Verlag.
    • (2002) Fifth International Symposium. RAID 2002 , vol.2516
    • Goldman, R.P.1
  • 12
    • 84958956850 scopus 로고    scopus 로고
    • Attacks against computer network: Formal grammar-based framework and simulation tool
    • Proceedings. Lecture Notes in Computer Science Springer Verlag
    • Gorodetski, V. and I. Kotenko. 2002. "Attacks against Computer Network: Formal Grammar-based Framework and Simulation Tool". Fifth International Symposium. RAID 2002. Proceedings. Lecture Notes in Computer Science, V.2516. Springer Verlag.
    • (2002) Fifth International Symposium. RAID 2002 , vol.2516
    • Gorodetski, V.1    Kotenko, I.2
  • 14
    • 6344284549 scopus 로고    scopus 로고
    • Multi-agent information fusion: Methodology, architecture and software tool for learning of object and situation assessment
    • Proceedings. Stockholm, Sweden. June 28 - July 1
    • Gorodetski, V.; O. Karsayev; I. Kotenko, V. Samoilov. 2004. "Multi-Agent Information Fusion: Methodology, Architecture and Software Tool for Learning of Object and Situation Assessment". The 7th International Conference on Information Fusion. Proceedings. Stockholm, Sweden. June 28 - July 1, P.346-353.
    • (2004) The 7th International Conference on Information Fusion , pp. 346-353
    • Gorodetski, V.1    Karsayev, O.2    Kotenko, I.3    Samoilov, V.4
  • 15
    • 0030263767 scopus 로고    scopus 로고
    • Collaborative plans for complex group actions
    • Grosz, B. and S. Kraus. 1996. "Collaborative plans for complex group actions". Artificial Intelligence, Vol.86.
    • (1996) Artificial Intelligence , vol.86
    • Grosz, B.1    Kraus, S.2
  • 17
    • 0029326031 scopus 로고
    • Controlling cooperative problem solving in industrial multi-agent systems using joint intentions
    • Jennings, N. 1995. "Controlling cooperative problem solving in industrial multi-agent systems using joint intentions". Artificial Intelligence, No.75.
    • (1995) Artificial Intelligence , Issue.75
    • Jennings, N.1
  • 20
    • 8344228427 scopus 로고    scopus 로고
    • Teamwork of hackers-agents: Modeling and simulation of coordinated distributed attacks on computer networks
    • Kotenko, I. 2003. "Teamwork of Hackers-Agents: Modeling and Simulation of Coordinated Distributed Attacks on Computer Networks". Lecture Notes in Artificial Intelligence, Vol.2691.
    • (2003) Lecture Notes in Artificial Intelligence , vol.2691
    • Kotenko, I.1
  • 21
    • 84856547585 scopus 로고    scopus 로고
    • Agent-based modeling and simulation of computer network attacks
    • Proceedings. Jean-Pierre Muller, Martina-M. Seidel (Editors). April 28-30. Montpellier. France
    • Kotenko, I. and E. Man'kov. 2003. "Agent-Based Modeling and Simulation of Computer Network Attacks". Fourth International Workshop "Agent-Based Simulation 4 (ABS 4)". Proceedings. Jean-Pierre Muller, Martina-M. Seidel (Editors). April 28-30. Montpellier. France.
    • (2003) Fourth International Workshop "Agent-based Simulation 4 (ABS 4),"
    • Kotenko, I.1    Man'kov, E.2
  • 23
    • 15944389600 scopus 로고    scopus 로고
    • Foundations for survivable system development: Service traces, intrusion traces, and evaluation models
    • Linger, R.C. and A.P. Moore. 2001. Foundations for Survivable System Development: Service Traces, Intrusion Traces, and Evaluation Models. Report CMU/SEI-2001-TR-029.
    • (2001) Report CMU/SEI-2001-TR-029
    • Linger, R.C.1    Moore, A.P.2
  • 25
    • 84856544257 scopus 로고    scopus 로고
    • Modeling and simulation activities in support of information assurance
    • Modeling and Simulation Activities
    • Modeling and Simulation Activities. 1997. Modeling and Simulation Activities in Support of Information Assurance. Report IATAC TR-97-002.
    • (1997) Report IATAC TR-97-002
  • 33
    • 0034300584 scopus 로고    scopus 로고
    • Intrusion-detection for incident-response, using a military battlefield-intelligence process
    • Yuill, J.; F. Wu; J. Settle; F. Gong; R. Forno; M. Huang; J. Asbery. 2000. Intrusion-detection for incident-response, using a military battlefield-intelligence process. Computer Networks, 34.
    • (2000) Computer Networks , vol.34
    • Yuill, J.1    Wu, F.2    Settle, J.3    Gong, F.4    Forno, R.5    Huang, M.6    Asbery, J.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.