Multi-agent systems

Results: 1893



#Item
471Law / Internet / Computer network security / Multi-agent systems / Botnets / Default judgment / Waledac botnet / Notice / Federal Rules of Civil Procedure / Computing / Spamming / Civil procedure

Case 1:10-cvLMB-JFA Document 47 FiledPage 1 of 20 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA

Add to Reading List

Source URL: lastwatchdog.com

Language: English - Date: 2011-05-16 18:26:00
472Multi-agent systems / Agent-based model / Spatial analysis / Modeling language / Economic model / Ethology / Knowledge / Scientific modeling / Science / Complex systems theory

Agent-Based Models of Land-Use and Land-Cover Change Report and Review of an International Workshop October 4–7, 2001, Irvine, California, USA Edited by: Dawn C. Parker, Thomas Berger, and Steven M. Manson Managing Edi

Add to Reading List

Source URL: www.globallandproject.org

Language: English - Date: 2012-09-25 15:08:16
473Computing / Computer network security / Multi-agent systems / Spamming / FireEye /  Inc. / Kelsey-Seybold Clinic / Malware

Case Study FireEye Wards Off Advanced Malware to Help Kelsey-Seybold Focus On Patient Care Key Components • FireEye Web MPS

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-04-30 16:06:28
474Multi-agent systems / Spamming / Cyberwarfare / Computer security / Denial-of-service attack / Botnet / Rizon / Cloud computing / Prolexic Technologies / Computer network security / Computing / Denial-of-service attacks

Features › The PopVote attack aftermath The PopVote attack aftermath By Sheila Lam and Carol Ko | 07 Jul 2014 Tag: 

Add to Reading List

Source URL: www.asiacloudcomputing.org

Language: English - Date: 2014-07-21 08:24:59
475Artificial intelligence / Multi-agent systems / Mathematical optimization / Agent-based model / Constraint satisfaction problem / Genetic algorithm / Psychological resilience / Computing / Constraint programming / Complex systems theory / Science

Evaluating Resilience Strategies Based on an Evolutionary Multi-agent System Kazuhiro Minami, Tomoya Tanjo, and Hiroshi Maruyama Institute of Statistical Mathematics, Tokyo, Japan Email: {kminami, tanjo, hm2}@ism.ac.jp

Add to Reading List

Source URL: systemsresilience.org

Language: English - Date: 2013-10-28 05:43:11
476War / Multi-agent systems / Simulation / Bombs / Explosives / Improvised explosive device / Computer simulation / Agent-based model / Social simulation / Science / Scientific modeling / Ethology

Agent-Based Simulation for Counter-IED: A Simulation Science Survey Dr. Anthony H. Dekker Joint Operations Division Defence Science and Technology Organisation (DSTO) Canberra, Australia

Add to Reading List

Source URL: members.ozemail.com.au

Language: English - Date: 2010-05-20 20:40:27
477Server appliance / Security appliance / Malware / Computer network security / Multi-agent systems / Spamming / FireEye /  Inc. / Computing / Computer security

Case Study Preeminent Internet Corporation Protects IP and Infrastructure With Global Deployment of FireEye Key Components • FireEye Web Malware Protection

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-05-01 06:26:31
478Knowledge / Scientific modeling / Systems / Multi-agent systems / Simulation / Agent-based model / Social simulation / Complex adaptive system / Intelligent agent / Science / Complex systems theory / Ethology

DOC Document

Add to Reading List

Source URL: hcs.ucla.edu

Language: English - Date: 2007-05-08 14:57:19
479Computing / FireEye /  Inc. / Multi-agent systems / Spamming / Malware / Botnet / Cyberwarfare / Computer network security / Computer security / Antivirus software

WHITE PAPER FIREEYE ADVANCED THREAT REPORT : 1H 2011 How advanced attacks succeed, despite $20B spent

Add to Reading List

Source URL: www.fireeye.kr

Language: English - Date: 2015-05-01 00:00:42
480Computer security / Cybercrime / FireEye /  Inc. / Multi-agent systems / OpenDNS / Botnet / Phishing / Malware / Network security / Computing / Computer network security / Spamming

FireEye Fuel Technology Alliances FireEye and OpenDNS Extend FireEye’s threat protection capabilities beyond the network perimeter

Add to Reading List

Source URL: www.fireeye.kr

Language: English - Date: 2015-04-30 18:21:42
UPDATE