Strategy based proxy to secure user agent from flooding attack in SIP.
Intesab HussainFarid Naït-AbdesselamPublished in: IWCMC (2011)
Keyphrases
- multi agent
- user interface
- interface agent
- end users
- multi agent systems
- mobile agents
- human users
- key exchange protocol
- conversational agent
- user authentication
- countermeasures
- autonomous agents
- multiagent systems
- user interaction
- software agents
- current situation
- authentication protocol
- security measures
- anomaly detection