Using Agent in Virtual Machine for Interactive Security Training.
Yi-Ming ChenCheng-En ChuangHsu-Che LiuCheng-Yi NiChun-Tang WangPublished in: FGIT-SecTech (2011)
Keyphrases
- virtual machine
- java card
- remote attestation
- cloud computing environment
- operating system
- windows xp
- data center
- computing resources
- distributed computing
- network access
- multi agent
- multiagent systems
- mobile agent system
- multi agent systems
- intelligent agents
- low latency
- autonomous agents
- information security
- conversational agents
- smart card
- training set
- security policies
- agent model
- multi tasking
- mobile agents
- cloud computing
- computer security
- training process
- intrusion detection
- virtual memory
- distributed systems
- data analysis
- machine learning
- data sets
- database