Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 13
Page No. 4905 - 4912

DA Conceptual Security Sub-Model for Enhancing Human-Agent Collaboration Based on Generic Nodal Approach

Authors : Khudhair Abbas Mohammed, Muamer N. Mohammed, Mazlina Abdul Majidmohd and Mohd Sharifuddin Ahmad

References

Adameit, S., T. Betz, L. Cabac, F. Hars and M. Hewelt et al., 2010. Modelling Distributed Network Security in a Petri Net-and Agent-Based Approach. In: Multiagent System Technologies MATES, Springer, Berlin, Germany, ISBN:13-978-3-642-16177-3, pp: 209-220.

Becker-Asano, C. and I. Wachsmuth, 2010. Affective computing with primary and secondary emotions in a virtual human. Auton. Agents MultiAgent Syst., 20: 32-49.
Direct Link  |  

Bijani, S. and D. Robertson, 2014. A review of attacks and security approaches in open multi-agent systems. Artif. Intell. Rev., 42: 607-636.
CrossRef  |  Direct Link  |  

Bresciani, P., A. Perini, P. Giorgini, F. Giunchiglia and J. Mylopoulos, 2004. Tropos: An agent-oriented software development methodology. Auton. Agents MultiAgent Syst., 8: 203-236.
Direct Link  |  

Casey, W., J.A. Morales, E. Wright, Q. Zhu and B. Mishra, 2016. Compliance signaling games: Toward modeling the deterrence of insider threats. Comput. Math. Organiz. Theory, 22: 318-349.
Direct Link  |  

Chae, C.J., K.N. Choi and K. Choi, 2016. Information interoperability system using multi-agent with security. Wirel. Pers. Commun., 89: 819-832.
Direct Link  |  

Clark, K.P., M.E. Warnier, F.M. Brazier and T.B. Quillinan, 2010. Secure monitoring of service level agreements. Proceedings of the International Conference on Availability, Reliability and Security (ARES'10), February 15-18, 2010, IEEE, Krakow, Poland, ISBN:978-0-7695-3965-2, pp: 454-461.

Gonzalez, M.C., C.A. Hidalgo and A.L. Barabasi, 2008. Understanding individual human mobility patterns. Nature, 453: 779-782.
CrossRef  |  

Hanna, N. and D. Richards, 2012. A Collaborative Agent Architecture with Human-Agent Communication Model. In: Cognitive Agents for Virtual Environments, Dignum, F., C. Brom, K. Hindriks, M. Beer and D. Richards (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-36443-3, pp: 70-88.

Hornok, S., D. Kovats, T. Csorgo, M.L. Meli and E. Gonczi et al., 2014. Birds as potential reservoirs of tick-borne pathogens: First evidence of bacteraemia with Rickettsia helvetica. Parasites Vectors, 7: 1-7.
PubMed  |  Direct Link  |  

Jansen, W. and T. Karygiannis, 2000. Privilege management of mobile agents. Proceedings of the 23rd National Conference on Information Systems Security, October 16-19, 2000, NIST, Baltimore, Maryland, pp: 362-370.

Jung, Y., M. Kim, A. Masoumzadeh and J.B. Joshi, 2012. A survey of security issue in multi-agent systems. Artif. Intell. Rev., 37: 239-260.
CrossRef  |  

Macal, C. and M. North, 2014. Introductory tutorial: Agent-based modeling and simulation. Proceedings of the Conference on Winter Simulation (WSC'14), December 7-10, 2014, IEEE, Savannah, Georgia, pp: 6-20.

Majid, M.A., 2011. Human behaviour modelling: An investigation using traditional discrete event and combined discrete event and agent-based simulation. Ph.D Thesis, University of Nottingham, Nottingham, England, UK.

Majid, M.A., M. Fakhreldin and K.Z. Zamli, 2016. An enhanced simulation model for complex human pedestrian movement system using hybrid discrete event and agent based simulation. Intl. Inf. Inst. Tokyo Inf., 19: 4213-4218.
Direct Link  |  

Majid, M.A., U. Aickelin and P.O. Siebers, 2009. Comparing simulation output accuracy of discrete event and agent based models: A quantitative approach. Proceedings of the Conference on Summer Computer Simulation (SCSC'09), July 13-16, 2009, ACM, Istanbul, Turkey, pp: 177-184.

Mohammed, K.A., M.S. Ahmad, S.A. Mostafa and F.M.A.M. Sharifuddin, 2012. A nodal approach to modeling human-agents collaboration. Intl. J. Comput. Appl. Found. Comput. Sci., 43: 33-40.
Direct Link  |  

Mohammed, K.A., S.A. Mostafa, M.S. Ahmad and M.A. Mahmoud, 2014. A qualitative analysis of human-agent functions for collaborative multi-agent system. Proceedings of the International Conference on Information Technology and Multimedia (ICIMU’14), November 18-20, 2014, IEEE, Putrajaya, Malaysia, ISBN:978-1-4799-5424-7, pp: 244-249.

Moradian, E., 2013. Security of E-Commerce Software Systems. In: Agent and Multi-Agent Systems in Distributed Systems- Digital Economy and E-Commerce, Hakansson, A. and R. Hartung (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-35207-2, pp: 95-103.

Mouratidis, H. and P. Giorgini, 2007. Secure tropos: A security-oriented extension of the tropos methodology. Intl. J. Software Eng. Knowl. Eng., 17: 285-309.
Direct Link  |  

Mouratidis, H., P. Giorgini and G. Manson, 2003. An Ontology for Modelling Security: The Tropos Approach. In: Knowledge-Based and Intelligent Information and Engineering Systems, Palade, V., R.J. Howlett and L. Jain (Eds.). Springer, Berlin, Germany, ISBN:978-3-540-40803-1, pp: 1387-1394.

Poslad, S., P. Charlton and M. Calisti, 2002. Specifying Standard Security Mechanisms in Multi-Agent Systems. In: Deception, Fraud and Trust in Agent Societies, Falcone, R., S. Barber, L. Korba and M. Singh (Eds.). Springer, Berlin, Germany, ISBN:978-3-540-00988-7, pp: 163-176.

Ramchurn, S.D., F. Wu, W. Jiang, J.E. Fischer and S. Reece et al., 2016. Human-agent collaboration for disaster response. Auton. Agents MultiAgent Syst., 30: 82-111.
Direct Link  |  

Sawa, Y., R. Bhakta, I.G. Harris and C. Hadnagy, 2016. Detection of social engineering attacks through natural language processing of conversations. Proceedings of the IEEE 10th International Conference on Semantic Computing (ICSC’16), February 4-6, 2016, IEEE, Laguna Hills, California, USA., ISBN:978-1-5090-0662-5, pp: 262-265.

Shih, D.H., H.S. Chiang, D.C. Yen and S.C. Huang, 2013. An intelligent embedded system for malicious email filtering. Comput. Stand. Interfaces, 35: 557-565.
Direct Link  |  

Wardell, D.C., R.F. Mills, G.L. Peterson and M.E. Oxley, 2016. A method for revealing and addressing security vulnerabilities in cyber-physical systems by modeling malicious agent interactions with formal verification. Procedia Comput. Sci., 95: 24-31.
Direct Link  |  

Yue, X., X. Qiu, Y. Ji and C. Zhang, 2009. P2P attack taxonomy and relationship analysis. Proceedings of the 11th International Conference on Advanced Communication Technology (ICACT’09) Vol. 2, February 15-18, 2009, IEEE, Phoenix Park, South Korea, ISBN:978-89-5519-138-7, pp: 1207-1210.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved