Login / Signup
Countering Security Vulnerabilities in Agent Execution Using a Self Executing Security Examination.
John Page
Arkady B. Zaslavsky
Maria Indrawan
Published in:
AAMAS (2004)
Keyphrases
</>
security vulnerabilities
intrusion detection
security properties
multi agent
penetration testing
multi agent systems
dos attacks
intelligent agents
unauthorized access
mobile agents
information systems
access control
web applications
intrusion detection system
security requirements
security protocols