Evaluating how well agent-based IDS perform
Intelligent agents-as a modern artificial intelligence concept-are now widely deployed in
various software systems. The agent can be defined as a software entity which functions …
various software systems. The agent can be defined as a software entity which functions …
Multiagent-based security for the wireless LAN
HM Faheem - IEEE Potentials, 2005 - ieeexplore.ieee.org
Wireless local area networks (WLANs) are being deployed in enterprises all over the world.
Enterprises recognize the value of wireless networks and arc using this technology to …
Enterprises recognize the value of wireless networks and arc using this technology to …
A multiagent-based approach for managing security policy
HM Faheem - … IFIP International Conference on Wireless and …, 2005 - ieeexplore.ieee.org
This paper describes a framework for a multiagent-based system that can be used to
manage security policies. The suggested framework consists of three layers they are: core …
manage security policies. The suggested framework consists of three layers they are: core …
[PDF][PDF] Performance evaluation of agent-based IDS
Intelligent agents–as a modern AI concept–are now widely deployed in various software
systems. Performance evaluation techniques for these systems are still in their early stage …
systems. Performance evaluation techniques for these systems are still in their early stage …
Mechanism to continue system availability during cyber threat scenario
It is known that cyber attacks on the application systems causes denial of services to avoid
confidentiality and integrity compromise. The system remains inaccessible until it is …
confidentiality and integrity compromise. The system remains inaccessible until it is …