Military network security using self organized multi-agent entangled hierarchies
暂无分享,去创建一个
[1] J. Susan Milton,et al. Introduction to Probability and Statistics: Principles and Applications for Engineering and the Computing Sciences , 1990 .
[2] Joseph A. Wolkan,et al. Introduction to probability and statistics , 1994 .
[3] KarageorgosAnthony,et al. Self-organization in multi-agent systems , 2005 .
[4] Dan Yamins. The emergence of global properties from local interactions: static properties and one-dimensional patterns , 2006, AAMAS '06.
[5] C. Moore,et al. Automatic filters for the detection of coherent structure in spatiotemporal systems. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.
[6] Peter J. Bentley,et al. Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator , 2001, Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No.01TH8546).
[7] Eckart Zitzler,et al. Indicator-Based Selection in Multiobjective Search , 2004, PPSN.
[8] Ryszard Kowalczyk,et al. Towards autonomous mobile agents with emergent migration behaviour , 2006, AAMAS '06.
[9] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[10] Noria Foukia. IDReAM: Intrusion Detection and Response Executed with Agent Mobility , 2004, Engineering Self-Organising Systems.
[11] Gary B. Lamont,et al. Evolutionary Algorithms for Solving Multi-Objective Problems (Genetic and Evolutionary Computation) , 2006 .
[12] W. J. DeCoursey,et al. Introduction: Probability and Statistics , 2003 .
[13] Eric M Holloway,et al. Self Organized Multi Agent Swarms (SOMAS) for Network Security Control , 2009 .
[14] Gary B. Lamont,et al. Evolutionary Algorithms for Solving Multi-Objective Problems , 2002, Genetic Algorithms and Evolutionary Computation.
[15] Neil Immerman,et al. The Complexity of Decentralized Control of Markov Decision Processes , 2000, UAI.
[16] Sheila B. Banks,et al. Toward Using Intelligent Agents to Detect, Assess, and Counter Cyberattacks in a Network-Centric Environment , 2005 .
[17] Marie-Pierre Gleizes,et al. Self-Organisation and Emergence in MAS: An Overview , 2006, Informatica.
[18] Prashant Doshi,et al. Exact solutions of interactive POMDPs using behavioral equivalence , 2006, AAMAS '06.