Keyphrases
- countermeasures
- mobile agents
- information security
- security measures
- mobile agent system
- cyber attacks
- java card
- security breaches
- client server
- security issues
- network management
- distributed systems
- load balancing
- security requirements
- intrusion detection
- computer security
- mobile agent technology
- distributed computing
- fault tolerance
- smart card
- mobile users
- information systems
- intelligent agents
- network connection
- mobile computing
- fault tolerant
- agent technology
- security mechanisms
- security policies
- network security
- computing environments
- power analysis
- artificial intelligence
- knowledge discovery
- data mining
- anomaly detection
- e government