Evaluating how well agent-based IDS perform

IM Hegazy, HM Faheem, T Al-Arif, T Ahmed - IEEE potentials, 2005 - ieeexplore.ieee.org
Intelligent agents-as a modern artificial intelligence concept-are now widely deployed in
various software systems. The agent can be defined as a software entity which functions …

Multiagent-based security for the wireless LAN

HM Faheem - IEEE Potentials, 2005 - ieeexplore.ieee.org
Wireless local area networks (WLANs) are being deployed in enterprises all over the world.
Enterprises recognize the value of wireless networks and arc using this technology to …

A multiagent-based approach for managing security policy

HM Faheem - … IFIP International Conference on Wireless and …, 2005 - ieeexplore.ieee.org
This paper describes a framework for a multiagent-based system that can be used to
manage security policies. The suggested framework consists of three layers they are: core …

[PDF][PDF] Performance evaluation of agent-based IDS

IM Hegazy, HM Faheem, T Al-Arif… - Proceedings of the 2nd …, 2005 - researchgate.net
Intelligent agents–as a modern AI concept–are now widely deployed in various software
systems. Performance evaluation techniques for these systems are still in their early stage …

Mechanism to continue system availability during cyber threat scenario

S Safdar, MF Hassan, K Hajjar, R Akbar… - Proceedings of the 11th …, 2017 - dl.acm.org
It is known that cyber attacks on the application systems causes denial of services to avoid
confidentiality and integrity compromise. The system remains inaccessible until it is …