Improving the security level of the FUSION@ multi-agent architecture
暂无分享,去创建一个
Javier Bajo | Juan M. Corchado | Cristian Pinzón | Juan Francisco de Paz | Dante I. Tapia | D. I. Tapia | J. Bajo | J. Corchado | Cristian Pinzón | J. F. D. Paz
[1] Steve Anderson,et al. Web Services Secure Conversation Language (WS-SecureConversation) , 2005 .
[2] G.S.V.R.K. Rao,et al. An Adaptive Intrusion Detection and Prevention (ID/IP) Framework for Web Services , 2008 .
[3] Nils Gruschka,et al. SOA and Web Services: New Technologies, New Standards - New Attacks , 2007, ECOWS 2007.
[4] Juan M. Corchado,et al. SCMAS: A distributed hierarchical multi-agent architecture for blocking attacks to databases , 2010 .
[5] Nils Gruschka,et al. Protecting Web Services from DoS Attacks by SOAP Message Validation , 2006, SEC.
[6] Nicholas R. Jennings,et al. Applying agent technology , 1995, Appl. Artif. Intell..
[7] T. Yalcinoz,et al. Implementing soft computing techniques to solve economic dispatch problem in power systems , 2008, Expert Syst. Appl..
[8] Javier Bajo,et al. Intelligent environment for monitoring Alzheimer patients, agent technology for health care , 2008, Decis. Support Syst..
[9] Alexander Elsas. Integration of e-Government and e-Commerce with Web Services , 2003, EGOV.
[10] Mayumi Hori,et al. Applying XML Web Services into Health Care Management , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[11] Javier Bajo,et al. A multi-agent architecture for distributed services and applications , 2009 .
[12] J. van Leeuwen,et al. Neural Networks: Tricks of the Trade , 2002, Lecture Notes in Computer Science.
[13] Klaus-Robert Müller,et al. Efficient BackProp , 2012, Neural Networks: Tricks of the Trade.
[14] David J. Israel,et al. Plans and resource‐bounded practical reasoning , 1988, Comput. Intell..
[15] Gian Luca Foresti,et al. Knowledge representation for ambient security , 2007, Expert Syst. J. Knowl. Eng..
[16] Winfried Lamersdorf,et al. Jadex: Implementing a BDI-Infrastructure for JADE Agents , 2003 .
[17] Phillip Hallam-Baker,et al. Web services security: soap message security , 2003 .
[18] Javier Bajo,et al. A Multiagent Based Strategy for Detecting Attacks in Databases in a Distributed Mode , 2008, DCAI.
[19] Jen-Yao Chung. Emerging view of service-oriented computing and applications , 2008, 2008 12th International Conference on Computer Supported Cooperative Work in Design.
[20] Marcus Gallagher,et al. Visualization of learning in multilayer perceptron networks using principal component analysis , 2003, IEEE Trans. Syst. Man Cybern. Part B.
[21] Juan M. Corchado,et al. A Reasoning Model for CBR_BDI Agents Using an Adaptable Fuzzy Inference System , 2003, CAEPIA.
[22] Eric Pulier,et al. Understanding Enterprise SOA , 2005 .
[23] Ho-fung Leung,et al. Agents in E-Commerce: State of the Art , 2002, Knowledge and Information Systems.
[24] Mark O'Neill,et al. Web Services Security , 2003 .
[25] Giovanni Della-Libera,et al. Web Services Trust Language (WS-Trust) , 2002 .
[26] Wei-Chuen Yau,et al. Design and Implementation of an XML Firewall , 2006, 2006 International Conference on Computational Intelligence and Security.
[27] Ramón F. Brena,et al. Knowledge and information distribution leveraged by intelligent agents , 2007, Knowledge and Information Systems.
[28] Kai Rannenberg,et al. Security and Privacy in Dynamic Environments , 2006 .
[29] Agnar Aamodt,et al. Case-Based Reasoning: Foundational Issues, Methodological Variations, and System Approaches , 1994, AI Commun..
[30] Richard O. Duda,et al. Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.
[31] Gottfried Vossen,et al. E-Learning as a Web Service , 2003 .