-
1
-
-
0002864744
-
Mobile agents for network management
-
4th Quarter
-
A. Bieszczad, T. White, and B. Pagurek, Mobile agents for network management, IEEE Communications Surveys, Vol. 1(1), 4th Quarter, 1999.
-
(1999)
IEEE Communications Surveys
, vol.1
, Issue.1
-
-
Bieszczad, A.1
White, T.2
Pagurek, B.3
-
3
-
-
20444475398
-
Modeling network attacks: Extending the attack tree paradigm
-
Orlando, Florida
-
J. Dawkins, C. Campbell, R. Larson, K. Fitch, T. Tidwell and J. Hale, Modeling network attacks: Extending the attack tree paradigm, Proceedings of Third Annual International Systems Security Engineering Association Conference, Orlando, Florida, 2002.
-
(2002)
Proceedings of Third Annual International Systems Security Engineering Association Conference
-
-
Dawkins, J.1
Campbell, C.2
Larson, R.3
Fitch, K.4
Tidwell, T.5
Hale, J.6
-
4
-
-
84904358407
-
Software agents in communications network management: An overview
-
University of London, London, u.K
-
A. Hayzelden and J. Bigham, Software agents in communications network management: An overview, Intelligent Systems Application Group, Technical Report, University of London, London, u.K., 1998.
-
(1998)
Intelligent Systems Application Group, Technical Report
-
-
Hayzelden, A.1
Bigham, J.2
-
5
-
-
0006513005
-
Otter: A general-purpose network visualization tool
-
San Jose, California
-
B. Huffaker, E. Nemeth and K. Claffy, Otter: A general-purpose network visualization tool, Proceedings of the Internet Global Summit, San Jose, California, 1999.
-
(1999)
Proceedings of the Internet Global Summit
-
-
Huffaker, B.1
Nemeth, E.2
Claffy, K.3
-
6
-
-
84950154314
-
Topology discovery by active probing
-
Nara, Japan
-
B. Huffaker, E. Nemeth, D. Moore and K. Claffy, Topology discovery by active probing, Symposium on Applications and the Internet, Nara, Japan, 2002.
-
(2002)
Symposium On Applications and The Internet
-
-
Huffaker, B.1
Nemeth, E.2
Moore, D.3
Claffy, K.4
-
7
-
-
8844233022
-
Secure mobile agents for network vulnerability scanning
-
States Military Academy, West Point, New York
-
J. Humphries, C. Carver and V. Pooch, Secure mobile agents for network vulnerability scanning, Proceedings of the 2000 IEEE SMC Workshop on Information Assurance and Security, United States Military Academy, West Point, New York, 2000.
-
(2000)
Proceedings of the 2000 IEEE SMC Workshop On Information Assurance and Security, United
-
-
Humphries, J.1
Carver, C.2
Pooch, V.3
-
8
-
-
84904291293
-
Discover, diagram and report on your network
-
Redmond, Washington
-
J. Lemke, Discover, diagram and report on your network, Technical Report, Microsoft Corporation, Redmond, Washington, 2001.
-
(2001)
Technical Report, Microsoft Corporation
-
-
Lemke, J.1
-
11
-
-
0003992319
-
-
Springer-Verlag, Heidelberg, Germany
-
N. Minar, K. Kramer and P. Maes, Software Agentsfor Future Communications Systems, Springer-Verlag, Heidelberg, Germany, 1999.
-
(1999)
Software Agentsfor Future Communications Systems
-
-
Minar, N.1
Kramer, K.2
Maes, P.3
-
12
-
-
84904301323
-
-
Optimum Network Performance, Bethesda, Maryland
-
Optimum Network Performance, http://www.opnet.com. Bethesda, Maryland, 2001.
-
(2001)
-
-
-
13
-
-
84904361204
-
-
Retina, Eeye Digital Security, Aliso Viejo, California
-
Retina, Eeye Digital Security, http://www.eeye.coml.Aliso Viejo, California, 2002.
-
(2002)
-
-
-
16
-
-
0032680957
-
Network modeling For management applications using intelligent mobile agents
-
T. White, B. Pagurek a nd A. Bieszczad, Network modeling For management applications using intelligent mobile agents, Journal of Network and Systems Management, Vol. 7(3), 1999.
-
(1999)
Journal of Network and Systems Management
, vol.7
, Issue.3
-
-
White, T.1
Pagurek, B.2
Bieszczad, A.3
|