Results 1 - 10
of
541
Intelligent versus Malicious Agent: A Comparative Study
"... The agent can be categorized into two types; one is known as an intelligent agent and the second is malicious agent, called computer viruses. These types of agents have some common characteristics; both are intelligent by nature and both have the properties reproduction and transfer from one host to ..."
Abstract
- Add to MetaCart
The agent can be categorized into two types; one is known as an intelligent agent and the second is malicious agent, called computer viruses. These types of agents have some common characteristics; both are intelligent by nature and both have the properties reproduction and transfer from one host
THE IMPACT OF MALICIOUS AGENTS ON THE ENTERPRISE SOFTWARE INDUSTRY 1
"... Abstract In this paper, a competitive software market that includes horizontal and quality differentiation, as well as a negative network effect driven by the presence of malicious agents, is modeled. Software products with larger installed bases, and therefore more potential computers to attack, p ..."
Abstract
- Add to MetaCart
Abstract In this paper, a competitive software market that includes horizontal and quality differentiation, as well as a negative network effect driven by the presence of malicious agents, is modeled. Software products with larger installed bases, and therefore more potential computers to attack
Cooperation among Malicious Agents: A General Quantitative Congestion Game Framework
"... Malicious behaviors and cooperation have been well studied separately. However, rare systematic study has been conducted on the combination of them: malicious cooperation. In this paper, a general quantitative utility function of malicious cooperation is firstly formulated in a congestion game frame ..."
Abstract
- Add to MetaCart
Malicious behaviors and cooperation have been well studied separately. However, rare systematic study has been conducted on the combination of them: malicious cooperation. In this paper, a general quantitative utility function of malicious cooperation is firstly formulated in a congestion game
Avoiding Malicious Agents in E-Commerce using Fuzzy Recommendations
"... One of the major issues of electronic commerce is how to decide pur-chases when there is no objective universal criteria to evaluate merchants and goods. Then subjective recommendations are a strong factor in de-termining the merchant to buy from. We consider the case of interactions among autonomou ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
agent occurs. This paper proposes situations involving a malicious recommender agent col-luding with the exploit of past reputation from a merchant. Based on the experimental results obtained from the simulation of this original situation leads to a interesting comparative of four reputation algorithms
Protecting Mobile Agents Against Malicious Hosts
, 1997
"... A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under execution and (b) the mobile code against tampering attempts by the executing host. Many techniques for the first ..."
Abstract
-
Cited by 325 (1 self)
- Add to MetaCart
problem (a) have been developed. The second problem (b) seems to be much harder: It is the general belief that computation privacy for mobile code cannot be provided without tamper resistant hardware. Furthermore it is doubted that an agent can keep a secret (e.g., a secret key to generate digital
Distributed function calculation via linear iterations in the presence of malicious agents – part I: Attacking the network,” in
- Proc. of the American Control Conference,
, 2008
"... Abstract-Given a network of interconnected nodes, each with its own value (such as a measurement, position, vote, or other data), we develop a distributed strategy that enables some or all of the nodes to calculate any arbitrary function of the node values, despite the actions of malicious nodes in ..."
Abstract
-
Cited by 66 (5 self)
- Add to MetaCart
Abstract-Given a network of interconnected nodes, each with its own value (such as a measurement, position, vote, or other data), we develop a distributed strategy that enables some or all of the nodes to calculate any arbitrary function of the node values, despite the actions of malicious nodes
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
, 1998
"... . In this paper, an approach to partially solve one of the most difficult aspects of security of mobile agents systems is presented, the problem of malicious hosts. This problem consists in the possibility of attacks against a mobile agent by the party that maintains an agent system node, a host. Th ..."
Abstract
-
Cited by 183 (5 self)
- Add to MetaCart
. In this paper, an approach to partially solve one of the most difficult aspects of security of mobile agents systems is presented, the problem of malicious hosts. This problem consists in the possibility of attacks against a mobile agent by the party that maintains an agent system node, a host
Detecting malicious groups of agents
- in: proc. 1st Symposium on Multi-Agent Security and Survivability’04, 2004
"... In this paper, we study coordinated attacks launched by multiple malicious agents and the problem of detecting ma-licious groups of attackers. The paper proposes a formal method and an algorithm for detecting action interference between users. It has to be pointed out that some members of a maliciou ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
In this paper, we study coordinated attacks launched by multiple malicious agents and the problem of detecting ma-licious groups of attackers. The paper proposes a formal method and an algorithm for detecting action interference between users. It has to be pointed out that some members of a
Results 1 - 10
of
541