-
2
-
-
84954469745
-
Suitability of agent-based systems for command and control in fault-tolerant, safety-critical responsive decision networks
-
Reno NV.: Aug. 13-15
-
T. Potok, L. Phillips & R.Pollock, "Suitability of Agent-Based Systems for Command and Control in Fault-tolerant, Safety-Critical Responsive Decision Networks," in Proc. 16th Int'l Conf. On Parallel and Distributed Computing Systems, Reno NV.: Aug. 13-15,2003.
-
(2003)
Proc. 16th Int'l Conf. on Parallel and Distributed Computing Systems
-
-
Potok, T.1
Phillips, L.2
Pollock, R.3
-
3
-
-
84864548573
-
Immaccs: A multi-agent decision-support system
-
Cal Poly, San Luis Obispo, CA: CAD Research Center
-
J. Pohl, M. Porczak & K.J. Pohl, "IMMACCS: A Multi-Agent Decision-Support System," in Technical Report CADRU-14-01, Cal Poly, San Luis Obispo, CA: CAD Research Center, 2001.
-
(2001)
Technical Report CADRU-14-01
-
-
Pohl, J.1
Porczak, M.2
Pohl, K.J.3
-
5
-
-
47949099622
-
Clustered adaptive rate limiting: Defeating denial-of-sleep attacks in wireless sensor networks
-
29-31 Oct. doi: 10.1109/MILCOM.2007.4455251
-
D.R Raymond, S.F. Midkiff, "Clustered Adaptive Rate Limiting: Defeating Denial-of-Sleep Attacks in Wireless Sensor Networks", Military Communications Conference, MILCOM 2007. IEEE , vol., no., pp.1-7, 29-31 Oct. 2007, doi: 10.1109/MILCOM.2007.4455251
-
(2007)
Military Communications Conference, MILCOM 2007. IEEE
, pp. 1-7
-
-
Raymond, D.R.1
Midkiff, S.F.2
-
7
-
-
54949116857
-
Combat operations c3i fundamentals and interactions
-
, Maxwell Air Force Base, AL: Air University Press.
-
E. Orr, "Combat Operations C3I Fundamentals and Interactions," in Research Report No. AU-ARI-82-5, Maxwell Air Force Base, AL: Air University Press., 1983.
-
(1983)
Research Report No. AU-ARI-82-5
-
-
Orr, E.1
-
8
-
-
84893467970
-
The darpa landroids program
-
Accessed Mar., 2012
-
M. Mcclurea, D.R. Corbettb & D.W. Gage, "The DARPA LANdroids program," Defense Advanced Research Projects Agency, 2009. [Online]. Available: http://144.206.159.178/ft/CONF/16432104/16432113.pdf. [Accessed Mar., 2012].
-
Defense Advanced Research Projects Agency, 2009
-
-
McClurea, M.1
Corbettb, D.R.2
Gage, D.W.3
-
11
-
-
25144472592
-
Multi-agent system architectures for wireless sensor networks
-
R. Tynan, G. O'hare & D.Marsh, "Multi-agent System Architectures for Wireless Sensor Networks," in Lecture Notes in Computer Science, 2005, Volume 3516/2005, pp37-58., 2005.
-
(2005)
Lecture Notes in Computer Science, 2005
, vol.3516
, Issue.2005
, pp. 37-58
-
-
Tynan, R.1
O'Hare, G.2
Marsh, D.3
-
12
-
-
33745588263
-
Autonomous agents and multi-agent systems (aamas) for the military-Issues and challenges
-
S.G. Thompson and R. Ghanea-Hercock (eds.), Jan. 2005
-
P. Beautement, D. Allsopp S. Goldsmith, S. Spires. S.G. Thompson, H. Janicke, & M.Greaves, "Autonomous Agents and Multi-agent Systems (AAMAS) for the Military-Issues and Challenges. Proc,"Damas 2005, S.G. Thompson and R. Ghanea-Hercock (eds.), pp. 1-13, Jan. 2005
-
Damas 2005
, pp. 1-13
-
-
Beautement, P.1
Allsopp, D.2
Goldsmith, S.3
Spires, S.4
Thompson, S.G.5
Janicke, H.6
Greaves, M.7
-
13
-
-
85015336184
-
Intelligent agents for intrusion detection
-
Syracuse, NY
-
Helmer G.G, Wong J.S, Honavar V, and Miller L. "Intelligent Agents for intrusion detection". In Proceedings, IEEE Information Technology Conference, pages 121-124, Syracuse, NY, 1998
-
(1998)
Proceedings, IEEE Information Technology Conference
, pp. 121-124
-
-
Helmer, G.G.1
Wong, J.S.2
Honavar, V.3
Miller, L.4
-
15
-
-
0345477912
-
A methodolgy for using intelligent agents to provide automated intrusion response
-
West Point, NY ,June 6-7
-
C.A. Carver, J.M. Hill, J.R. Surdu and U.W. Pooch "A Methodolgy for using Intelligent Agents to provide Automated Intrusion Response" IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, NY ,June 6-7 2000, pp. 110-116
-
(2000)
IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop
, pp. 110-116
-
-
Carver, C.A.1
Hill, J.M.2
Surdu, J.R.3
Pooch, U.W.4
-
18
-
-
0027961889
-
Self-nonself discrimination in a computer
-
16-18 May, doi: 10.1109/RISP.1994.296580I
-
S. Forrest, A.S. Perelson, L. Allen, R. Cherukuri, "Self-nonself discrimination in a computer, "Research in Security and Privacy, 1994. Proceeding"., 1994 IEEE Computer Society Symposium on, vol., no., pp.202,212, 16-18 May 1994 doi: 10.1109/RISP.1994.296580I.
-
(1994)
Research in Security and Privacy, 1994. Proceeding., 1994 IEEE Computer Society Symposium on
, pp. 202-212
-
-
Forrest, S.1
Perelson, A.S.2
Allen, L.3
Cherukuri, R.4
-
20
-
-
35348829230
-
-
Upper Saddle River, NJ: Addison Wesley
-
C. Wysopal, L. Nelson, D. Dai Zovi, and E. Dustin, E. "The Art of Software Security Testing". Upper Saddle River, NJ: Addison Wesley, 2007
-
(2007)
The Art of Software Security Testing
-
-
Wysopal, C.1
Nelson, L.2
Dai Zovi, D.3
Dustin, E.E.4
-
21
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
Oakland, CA: May 16-19
-
K. Koscher, A. Czeskis & F.Roesner, "Experimental Security Analysis of a Modern Automobile," in Proc. IEEE Symposium on Security and Privacy, Oakland, CA: May 16-19, 2010.
-
(2010)
Proc. IEEE Symposium on Security and Privacy
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
-
23
-
-
84893495120
-
Realising the network centric warfare vision: Network technology challenges and guidelines
-
J.A. Freebersyser and J.P. Macker. "Realising the Network Centric Warfare Vision: Network Technology Challenges and Guidelines". USA.DARPA.
-
USA.DARPA
-
-
Freebersyser, J.A.1
Macker, J.P.2
|