Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile agents
biblio
A Multi Agent-Based Security Protocol for Securing Password Management Application
Submitted by grigby1 on Tue, 04/27/2021 - 1:16pm
computer architecture
Cryptography
pubcrawl
Human behavior
resilience
Resiliency
authentication
Protocols
mobile agents
Metrics
Compositionality
password
Browser Security
architecture
security protocol
multi-agent
biblio
Proposed security by IDS-AM in Android system
Submitted by grigby1 on Tue, 12/01/2020 - 12:45pm
intrusion detection system
smart phones
security of data
Resiliency
resilience
Monitoring
mobile systems
mobile environment
mobile computing
mobile agents
malware
malicious behavior
pubcrawl
Intrusion Detection
IDS-AM
IDS
feature extraction
Data mining
composability
attacks
Android system
Android OS
android
biblio
ReverseRoute: An Application-Layer Scheme for Detecting Blackholes in MANET Using Mobile Agents
Submitted by aekwall on Mon, 06/10/2019 - 9:15am
mobility speeds
Throughput
telecommunication security
single nodes
simple application layer based intrusion detection scheme
security attacks
Scalability
Routing protocols
Routing
Resiliency
pubcrawl
multiple blackhole nodes
application-layer scheme
mobile agents
mobile ad hoc networks
Metrics
MANET Attack Detection
MANET
lower layers
Intrusion Detection
effective application layer based intrusion detection scheme
detection mechanism
composability
Blackhole attack
biblio
Protecting Agents from Malicious Hosts using Trusted Platform Modules (TPM)
Submitted by aekwall on Mon, 03/11/2019 - 9:37am
mobile agent system
Trusted Platfrom Modules
trusted platform modules
tpm
Task Analysis
software agents
software agent usage approach
security of data
security mechanisms
security experts
secure protocol
Resiliency
pubcrawl
Protocols
mobile agents
agent based system builders
malicious host
Java agent development framework
Java
JADE
Hardware Protection
eminent scientific community
Data processing
Cryptography
Conferences
computing problems
computing paradigm
composability
Agent Protection
biblio
Distributed Intrusion Detection Using Mobile Agents in Wireless Body Area Networks
Submitted by grigby1 on Mon, 04/02/2018 - 11:55am
security of data
patient monitoring
privacy
pubcrawl
real-time patient monitoring
resilience
Resiliency
Scalability
security
patient data
sensors
telecommunication security
Wearable devices
wearables security
Wireless body area networks
Wireless communication
wireless medical sensors
wireless sensor networks
Human behavior
body area networks
body sensor networks
Communication system security
Data protection
distributed intrusion detection
distributed mobile agent-based intrusion detection system
health care
healthcare systems
autonomous mobile agents
implanted medical devices
learning (artificial intelligence)
local network level anomaly detection
machine learning algorithms
medical healthcare applications
mobile agents
patient care
biblio
Secure lightweight ECC-based protocol for multi-agent IoT systems
Submitted by grigby1 on Tue, 12/12/2017 - 12:25pm
Computational efficiency
ECC
Elliptic curve cryptography
IoT
location-based services
Metrics
mobile agents
Multi-agents
Protocols
pubcrawl
Resiliency
RSA
Scalability
Servers
biblio
Secure fault tolerance mechanism of wireless Ad-Hoc networks with mobile agents
Submitted by BrandonB on Wed, 05/06/2015 - 8:01am
related works
wireless self-organization networks
wireless ad hoc networks
unauthorized attempts
telecommunication security
telecommunication network reliability
signal processing
security threats
security reliability
security precautions
secure mobile agent
secure fault tolerance
secure communication
Ad hoc networks
mobile nodes
mobile agents
mobile agent migration
mobile agent
mobile ad hoc networks
Fault tolerant systems
fault tolerance
fault masking
Erbium
dynamic self-organization networks
Conferences
Ad-Hoc Network
biblio
Using Set-Based Heading to Improve Mobile Agent Movement
Submitted by BrandonB on Tue, 05/05/2015 - 11:09am
network theory (graphs)
Topology
Time measurement
situational security
situational awareness
set-based heading
security of data
security
scale-free graph
random walk
random processes
nonheading movement technique
cover time
network (graph)
movement method
mobile agents
mobile agent movement
minimum distance graph
History
heading
Geography
foraging application
Electronic mail
dynamic graph topology
biblio
A Survey of Intrusion Detection Systems in Wireless Sensor Networks
Submitted by BrandonB on Tue, 05/05/2015 - 8:28am
mobile agents
WSN
wireless sensor networks
Wireless Sensor Network
Unified modeling language
telecommunication security
security
research issues
Monitoring
Ad hoc networks
mobile ad hoc networks
mobile ad hoc network
MANET
Intrusion Detection Systems
Intrusion Detection
IDS guidelines
IDS
biblio
Mobile agent based intrusion detection system
Submitted by BrandonB on Thu, 04/30/2015 - 12:26pm
mobile agent
suspicious patterns identification
signal processing
security of data
NIDS
network-based system
network activity
mobile agents
mobile agent based intrusion detection system
Anomaly Detection
misuse detection
Intrusion Detection
internet
Informatics
host-based system
cyber attack
Conferences
Computers