Agent-Based Network Protection Against Malicious Code
暂无分享,去创建一个
[1] William Stallings,et al. Data and Computer Communications , 1985 .
[2] David G. Stork,et al. Pattern Classification (2nd ed.) , 1999 .
[3] David Moore,et al. Internet quarantine: requirements for containing self-propagating code , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[4] Angelos D. Keromytis,et al. A holistic approach to service survivability , 2003, SSRS '03.
[5] Jörg P. Müller,et al. A Model for Cooperative Transportation Scheduling , 1995, ICMAS.
[6] Jeffrey M. Bradshaw,et al. Representing Context for Multiagent Trust Modeling , 2006, 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology.
[7] David G. Stork,et al. Pattern Classification , 1973 .
[8] Reid G. Smith,et al. The Contract Net Protocol: High-Level Communication and Control in a Distributed Problem Solver , 1980, IEEE Transactions on Computers.
[9] Angelos D. Keromytis,et al. Countering network worms through automatic patch generation , 2005, IEEE Security & Privacy Magazine.
[10] William Stallings. Data and Computer "Communications, 7th ed , 2004 .
[11] Pattie Maes,et al. Computational reflection , 1987, The Knowledge Engineering Review.
[12] Patrick Haffner,et al. ACAS: automated construction of application signatures , 2005, MineNet '05.
[13] Stefan Axelsson,et al. Intrusion Detection Systems: A Survey and Taxonomy , 2002 .
[14] Michal Pechoucek,et al. Trust Modeling with Context Representation and Generalized Identities , 2007, CIA.
[15] Michal Pechoucek,et al. Trust model for open ubiquitous agent systems , 2005, IEEE/WIC/ACM International Conference on Intelligent Agent Technology.