<--- Back to Details
First PageDocument Content
Cyberwarfare / AAFID / Data security / Intrusion detection system / Anomaly detection / Mobile agent / Software agent / Bro / Network intrusion detection system / Computer security / Computer network security / Computing
Date: 2012-11-09 09:38:16
Cyberwarfare
AAFID
Data security
Intrusion detection system
Anomaly detection
Mobile agent
Software agent
Bro
Network intrusion detection system
Computer security
Computer network security
Computing

NISTIR 6416, Applying Mobile Agents to Intrusion Detection and Response

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 494,74 KB

Share Document on Facebook

Similar Documents

Concepts and Architecture of a Security-Centric Mobile Agent Server Volker Roth Mehrdad Jalali-Sohi Fraunhofer Institut f¨ur Graphische Datenverarbeitung

DocID: 1v0zS - View Document

On the Robustness of some Cryptographic Protocols for Mobile Agent Protection Volker Roth Fraunhofer Institut f¨ur Graphische Datenverarbeitung Rundeturmstraße 6, 64283 Darmstadt, Germany

DocID: 1uZJK - View Document

Connecting to the Insured Applied Mobile® is the first insurance agent mobile application to bring client, policy

DocID: 1u3LX - View Document

Multi-agent systems / Artificial intelligence / Ant robotics / Robot / Biology / Swarm behaviour / Mobile robot / Autonomous robot / Swarm robotics / Swarm intelligence / Computing / Ant

1 Two Foraging Algorithms for Robot Swarms Using Only Local Communication Nicholas R. Hoff III, Amelia Sagoff, Robert J. Wood, Radhika Nagpal

DocID: 1r6SJ - View Document

Security / Cryptography / Computing / Formal sciences / Theoretical computer science / Secure multi-party computation / Cryptographic protocol / Mobile agent / Algorithm / Transmission Control Protocol / Computer security

Abstract Privacy, Integrity, and Incentive-Compatibility in Computations with Untrusted Parties Sheng Zhong 2004

DocID: 1r5Nn - View Document