Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems
暂无分享,去创建一个
Krzysztof Rzadca | Alexander Kott | Martin Drasar | Fabio De Gaspari | Mauno Pihelgas | Paul Théron | Luigi V. Mancini | Benoît Leblanc | K. Rządca | L. Mancini | A. Kott | Mauno Pihelgas | P. Théron | Martin Drasar | Benoît Leblanc
[1] Sheila B. Banks,et al. Toward Using Intelligent Agents to Detect, Assess, and Counter Cyberattacks in a Network-Centric Environment , 2005 .
[2] Salvatore J. Stolfo,et al. Baiting Inside Attackers Using Decoy Documents , 2009, SecureComm.
[3] Darragh O'Brien,et al. Machine Learning for Automatic Defence Against Distributed Denial of Service Attacks , 2007, 2007 IEEE International Conference on Communications.
[4] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[5] Hyacinth S. Nwana,et al. Software agents: an overview , 1996, The Knowledge Engineering Review.
[6] Galen C. Hunt,et al. Shielding Applications from an Untrusted Cloud with Haven , 2014, OSDI.
[7] Ralph Johnson,et al. design patterns elements of reusable object oriented software , 2019 .
[8] Grady Booch,et al. Object-Oriented Analysis and Design with Applications , 1990 .
[9] S.D.J. McArthur,et al. Multi-Agent Systems for Power Engineering Applications—Part I: Concepts, Approaches, and Technical Challenges , 2007, IEEE Transactions on Power Systems.
[10] Emmett Witchel,et al. InkTag: secure applications on an untrusted operating system , 2013, ASPLOS '13.
[11] Wilfried Elmenreich,et al. Intelligent Methods in Embedded Systems , 2003, WISES.
[12] Krzysztof Rzadca,et al. An introductory preview of Autonomous Intelligent Cyber-defense Agent reference architecture, release 2.0 , 2020 .
[13] Elizabeth Bodine-Baron,et al. Improving the Cybersecurity of U.S. Air Force Military Systems Throughout Their Life Cycles , 2015 .
[14] Demis Hassabis,et al. Mastering the game of Go without human knowledge , 2017, Nature.
[15] Jean-Pierre Müller,et al. Emergence of Collective Behaviour and Problem Solving , 2003, ESAW.
[16] Kenneth D. Forbus,et al. AI on the battlefield: an experimental exploration , 2002, AAAI/IAAI.
[17] David Šišlák,et al. AgentFly: Scalable, High‐Fidelity Framework for Simulation, Planning and Collision Avoidance of Multiple UAVs , 2012 .
[18] Kenneth D. Forbus,et al. Incorporating AI into Military Decision Making: An Experiment , 2003, IEEE Intell. Syst..
[19] Krzysztof Rzadca,et al. Autonomous Intelligent Cyber-defense Agent (AICA) Reference Architecture, Release 2.0 , 2019 .
[20] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[21] Bo Chen,et al. A Review of the Applications of Agent Technology in Traffic and Transportation Systems , 2010, IEEE Transactions on Intelligent Transportation Systems.
[22] Jean-Paul Jamont,et al. A multiagent approach to manage communication in wireless instrumentation systems , 2010 .
[23] Jules Pagna Disso,et al. A Plausible Solution to SCADA Security Honeypot Systems , 2013, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications.
[24] Sushil Jajodia,et al. AHEAD: A New Architecture for Active Defense , 2016, SafeConfig@CCS.
[25] J. Yuill,et al. Honeyfiles: deceptive files for intrusion detection , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[26] Michal Pechoucek,et al. Industrial deployment of multi-agent technologies: review and selected case studies , 2008, Autonomous Agents and Multi-Agent Systems.
[27] J. I. Escudero,et al. Multi-Agent and Embedded System Technologies Applied to Improve the Management of Power Systems , 2010, J. Digit. Content Technol. its Appl..
[28] Nicholas R. Jennings,et al. Intelligent agents: theory and practice , 1995, The Knowledge Engineering Review.
[29] Karim Eldefrawy. SMART: Secure and Minimal Architecture for (Establishing a Dynamic) Root of Trust , 2012, NDSS 2012.
[30] Roberto Di Pietro,et al. Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks , 2006, Wirel. Networks.
[31] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[32] K. Weick. The Collapse of Sensemaking in Organizations: The Mann Gulch Disaster , 1993 .
[33] Mauro Conti,et al. SANA: Secure and Scalable Aggregate Network Attestation , 2016, CCS.
[34] Roberto Di Pietro,et al. Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.
[35] Jean-Paul Jamont,et al. A framework to simulate and support the design of distributed automation and decentralized control systems: Application to control of indoor building comfort , 2011, Computational Intelligence in Control and Automation (CICA).
[36] Michal Pechoucek,et al. Towards Simulation-Aided Design of Multi-Agent Systems , 2010, ProMAS.