메뉴 건너뛰기




Volumn , Issue , 2002, Pages 297-302

The multi-agent systems for computer network security assurance: Frameworks and case studies

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER CRIME; COMPUTER NETWORKS; FORMAL METHODS; INTELLIGENT AGENTS; INTRUSION DETECTION; MERCURY (METAL); NETWORK SECURITY; SOFTWARE AGENTS; SOFTWARE PROTOTYPING;

EID: 84962822328     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICAIS.2002.1048117     Document Type: Conference Paper
Times cited : (29)

References (17)
  • 2
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion Detection System and Multisensor Data Fusion: Creating Cyberspace Situational Awareness
    • T.Bass, "Intrusion Detection System and Multisensor Data Fusion: Creating Cyberspace Situational Awareness", Communication of the ACM, Vol.43, No. 4, 2000.
    • (2000) Communication of the ACM , vol.43 , Issue.4
    • Bass, T.1
  • 4
    • 0030701247 scopus 로고    scopus 로고
    • Information System Attacks: A Preliminary Classification Scheme
    • F.B.Cohen, "Information System Attacks: A Preliminary Classification Scheme", Computers and Security, Vol.16, No.1, 1997.
    • (1997) Computers and Security , vol.16 , Issue.1
    • Cohen, F.B.1
  • 5
    • 3042553959 scopus 로고    scopus 로고
    • An Intelligent Intrusion Detection System for Intrusion Detection
    • Springer Verlag
    • D.Dasgupta and F.Gonzales, "An Intelligent Intrusion Detection System for Intrusion Detection", Lecture Notes in Computer Science, Vol.2052, Springer Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2052
    • Dasgupta, D.1    Gonzales, F.2
  • 8
    • 3042592075 scopus 로고    scopus 로고
    • Integrated Multi-Agent Information Security System: Mechanisms of Agents' Operation and Learning
    • Manchester. UK
    • V.Gorodetski, I.Kotenko, L.Popyack, and V.Skormin, "Integrated Multi-Agent Information Security System: Mechanisms of Agents' Operation and Learning", PAAM' 2000. Manchester. UK. 2000.
    • (2000) PAAM' 2000
    • Gorodetski, V.1    Kotenko, I.2    Popyack, L.3    Skormin, V.4
  • 11
    • 0003615205 scopus 로고    scopus 로고
    • A Common Language for Computer Security Incidents
    • October
    • J.D.Howard, and T.A.Longstaff, A Common Language for Computer Security Incidents, SANDIA REPORT, SAND98-8667, October 1998.
    • (1998) SANDIA Report
    • Howard, J.D.1    Longstaff, T.A.2
  • 14
    • 0004229237 scopus 로고    scopus 로고
    • Ph.D. Dissertation, Computer Sciences Department, Purdue University, Lafayette, IN, May
    • I.V.Krsul, Software Vulnerability Analysis, Ph.D. Dissertation, Computer Sciences Department, Purdue University, Lafayette, IN, May, 1998.
    • (1998) Software Vulnerability Analysis
    • Krsul, I.V.1
  • 16
    • 2942599742 scopus 로고    scopus 로고
    • Algorithms for Mining System Audit Data
    • T. Y. Lin and N. Cercone (eds.), Kluwer Academic Publishers
    • W.Lee, S.Stolfo, and K.Mok, "Algorithms for Mining System Audit Data". Data Retrieval and Data Mining. T. Y. Lin and N. Cercone (eds.), Kluwer Academic Publishers, 1999.
    • (1999) Data Retrieval and Data Mining
    • Lee, W.1    Stolfo, S.2    Mok, K.3
  • 17
    • 0002522158 scopus 로고    scopus 로고
    • Meta-Learning in Distributed Data Mining Systems: Issues and Approaches
    • Kargupta and Chan (eds.), AAAI Press
    • A.Prodromidis, P.Chan, and S.Stolfo, "Meta-Learning in Distributed Data Mining Systems: Issues and Approaches", Advances in Distributed Data Mining, Kargupta and Chan (eds.), AAAI Press, 1999.
    • (1999) Advances in Distributed Data Mining
    • Prodromidis, A.1    Chan, P.2    Stolfo, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.