Dummy-Based Approach for Protecting Mobile Agents Against Malicious Destination Machines.
Bandar AlluhaybiMohamad Shady AlrahhalAhmed AlzahraniVijey ThayananthanPublished in: IEEE Access (2020)
Keyphrases
- mobile agents
- distributed computing
- client server
- distributed systems
- mobile agent technology
- load balancing
- distributed data mining
- agent technology
- mobile computing
- network management
- intelligent agents
- fault tolerance
- computing environments
- mobile environments
- access control
- mobile users
- machine learning
- data collection
- artificial neural networks