Pinzón et al., 2012 - Google Patents
Improving the security level of the FUSION@ multi-agent architecturePinzón et al., 2012
View PDF- Document ID
- 2019675199760950071
- Author
- Pinzón C
- De Paz J
- Tapia D
- Bajo J
- Corchado J
- Publication year
- Publication venue
- Expert Systems with Applications
External Links
Snippet
The use of architectures based on services and multi-agent systems has become an increasingly important part of the solution set used for the development of distributed systems. Nevertheless, these models pose a variety of problems with regards to security …
- 230000004927 fusion 0 title abstract 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RM et al. | An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture | |
Pinzón et al. | S-MAS: An adaptive hierarchical distributed multi-agent architecture for blocking malicious SOAP messages within Web Services environments | |
Baig | Multi-agent systems for protecting critical infrastructures: A survey | |
Herrero et al. | MOVIH-IDS: A mobile-visualization hybrid intrusion detection system | |
Wang et al. | Computational intelligence for information security: A survey | |
Tziakouris et al. | A survey on self-adaptive security for large-scale open environments | |
Nkoom et al. | Securing the internet of robotic things: a comprehensive review on machine learning-based intrusion detection | |
Pinzón et al. | Improving the security level of the FUSION@ multi-agent architecture | |
Ribino et al. | Swarm intelligence model for securing healthcare ecosystem | |
Kamal et al. | Privacy and security federated reference architecture for Internet of Things | |
Bhaskara et al. | Causal effect analysis-based intrusion detection system for IoT applications | |
Abdelbasit | Cybersecurity attacks detection for MQTT-IoT networks using machine learning ensemble techniques | |
Goswami et al. | Utilizing deep belief network for ensuring privacy-preserved access control of data | |
Pinzon et al. | Real-time CBR-agent with a mixture of experts in the reuse stage to classify and detect DoS attacks | |
Chiang et al. | Risk and vulnerability assessment of secure autonomic communication networks | |
Hussain et al. | Federated Learning-Assisted Coati Deep Learning-Based Model for Intrusion Detection in MANET | |
Alqbaishi et al. | Reputation evaluation using fuzzy logic for Blockchain-Based access control in an IoT environment | |
Jose et al. | DOMAIN-based intelligent network intrusion detection system | |
Rafferty | Agent-based modeling framework for adaptive cyber defence of the Internet of Things | |
Bogg et al. | When to use a multi-agent system? | |
Aliyu et al. | Dynamic access control at the network edge using an adaptive risk-based access control system (ad-RACs) | |
Alkhresheh | Dynamic Access Control Framework for Internet of Things | |
Al-Swed et al. | Trust as a pre-defense step for IoT authorization | |
Agarwal et al. | BCIDS‐IoT: A Binary Classification Intrusion Detection Scheme for Internet of Things Communication | |
Isaza et al. | Intrusion correlation using ontologies and multi-agent systems |