Journal of Engineering and Applied Sciences
Year:
2018
Volume:
13
Issue:
13
Page No.
4905 - 4912
References
Adameit, S., T. Betz, L. Cabac, F. Hars and M. Hewelt
et al., 2010. Modelling Distributed Network Security in a Petri Net-and Agent-Based Approach. In: Multiagent System Technologies MATES, Springer, Berlin, Germany, ISBN:13-978-3-642-16177-3, pp: 209-220.
Becker-Asano, C. and I. Wachsmuth, 2010. Affective computing with primary and secondary emotions in a virtual human. Auton. Agents MultiAgent Syst., 20: 32-49.
Direct Link | Bijani, S. and D. Robertson, 2014. A review of attacks and security approaches in open multi-agent systems. Artif. Intell. Rev., 42: 607-636.
CrossRef | Direct Link | Bresciani, P., A. Perini, P. Giorgini, F. Giunchiglia and J. Mylopoulos, 2004. Tropos: An agent-oriented software development methodology. Auton. Agents MultiAgent Syst., 8: 203-236.
Direct Link | Casey, W., J.A. Morales, E. Wright, Q. Zhu and B. Mishra, 2016. Compliance signaling games: Toward modeling the deterrence of insider threats. Comput. Math. Organiz. Theory, 22: 318-349.
Direct Link | Chae, C.J., K.N. Choi and K. Choi, 2016. Information interoperability system using multi-agent with security. Wirel. Pers. Commun., 89: 819-832.
Direct Link | Clark, K.P., M.E. Warnier, F.M. Brazier and T.B. Quillinan, 2010. Secure monitoring of service level agreements. Proceedings of the International Conference on Availability, Reliability and Security (ARES'10), February 15-18, 2010, IEEE, Krakow, Poland, ISBN:978-0-7695-3965-2, pp: 454-461.
Gonzalez, M.C., C.A. Hidalgo and A.L. Barabasi, 2008. Understanding individual human mobility patterns. Nature, 453: 779-782.
CrossRef | Hanna, N. and D. Richards, 2012. A Collaborative Agent Architecture with Human-Agent Communication Model. In: Cognitive Agents for Virtual Environments, Dignum, F., C. Brom, K. Hindriks, M. Beer and D. Richards (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-36443-3, pp: 70-88.
Hornok, S., D. Kovats, T. Csorgo, M.L. Meli and E. Gonczi
et al., 2014. Birds as potential reservoirs of tick-borne pathogens: First evidence of bacteraemia with
Rickettsia helvetica. Parasites Vectors, 7: 1-7.
PubMed | Direct Link | Jansen, W. and T. Karygiannis, 2000. Privilege management of mobile agents. Proceedings of the 23rd National Conference on Information Systems Security, October 16-19, 2000, NIST, Baltimore, Maryland, pp: 362-370.
Jung, Y., M. Kim, A. Masoumzadeh and J.B. Joshi, 2012. A survey of security issue in multi-agent systems. Artif. Intell. Rev., 37: 239-260.
CrossRef | Macal, C. and M. North, 2014. Introductory tutorial: Agent-based modeling and simulation. Proceedings of the Conference on Winter Simulation (WSC'14), December 7-10, 2014, IEEE, Savannah, Georgia, pp: 6-20.
Majid, M.A., 2011. Human behaviour modelling: An investigation using traditional discrete event and combined discrete event and agent-based simulation. Ph.D Thesis, University of Nottingham, Nottingham, England, UK.
Majid, M.A., M. Fakhreldin and K.Z. Zamli, 2016. An enhanced simulation model for complex human pedestrian movement system using hybrid discrete event and agent based simulation. Intl. Inf. Inst. Tokyo Inf., 19: 4213-4218.
Direct Link | Majid, M.A., U. Aickelin and P.O. Siebers, 2009. Comparing simulation output accuracy of discrete event and agent based models: A quantitative approach. Proceedings of the Conference on Summer Computer Simulation (SCSC'09), July 13-16, 2009, ACM, Istanbul, Turkey, pp: 177-184.
Mohammed, K.A., M.S. Ahmad, S.A. Mostafa and F.M.A.M. Sharifuddin, 2012. A nodal approach to modeling human-agents collaboration. Intl. J. Comput. Appl. Found. Comput. Sci., 43: 33-40.
Direct Link | Mohammed, K.A., S.A. Mostafa, M.S. Ahmad and M.A. Mahmoud, 2014. A qualitative analysis of human-agent functions for collaborative multi-agent system. Proceedings of the International Conference on Information Technology and Multimedia (ICIMU’14), November 18-20, 2014, IEEE, Putrajaya, Malaysia, ISBN:978-1-4799-5424-7, pp: 244-249.
Moradian, E., 2013. Security of E-Commerce Software Systems. In: Agent and Multi-Agent Systems in Distributed Systems- Digital Economy and E-Commerce, Hakansson, A. and R. Hartung (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-35207-2, pp: 95-103.
Mouratidis, H. and P. Giorgini, 2007. Secure tropos: A security-oriented extension of the tropos methodology. Intl. J. Software Eng. Knowl. Eng., 17: 285-309.
Direct Link | Mouratidis, H., P. Giorgini and G. Manson, 2003. An Ontology for Modelling Security: The Tropos Approach. In: Knowledge-Based and Intelligent Information and Engineering Systems, Palade, V., R.J. Howlett and L. Jain (Eds.). Springer, Berlin, Germany, ISBN:978-3-540-40803-1, pp: 1387-1394.
Poslad, S., P. Charlton and M. Calisti, 2002. Specifying Standard Security Mechanisms in Multi-Agent Systems. In: Deception, Fraud and Trust in Agent Societies, Falcone, R., S. Barber, L. Korba and M. Singh (Eds.). Springer, Berlin, Germany, ISBN:978-3-540-00988-7, pp: 163-176.
Ramchurn, S.D., F. Wu, W. Jiang, J.E. Fischer and S. Reece
et al., 2016. Human-agent collaboration for disaster response. Auton. Agents MultiAgent Syst., 30: 82-111.
Direct Link | Sawa, Y., R. Bhakta, I.G. Harris and C. Hadnagy, 2016. Detection of social engineering attacks through natural language processing of conversations. Proceedings of the IEEE 10th International Conference on Semantic Computing (ICSC’16), February 4-6, 2016, IEEE, Laguna Hills, California, USA., ISBN:978-1-5090-0662-5, pp: 262-265.
Shih, D.H., H.S. Chiang, D.C. Yen and S.C. Huang, 2013. An intelligent embedded system for malicious email filtering. Comput. Stand. Interfaces, 35: 557-565.
Direct Link | Wardell, D.C., R.F. Mills, G.L. Peterson and M.E. Oxley, 2016. A method for revealing and addressing security vulnerabilities in cyber-physical systems by modeling malicious agent interactions with formal verification. Procedia Comput. Sci., 95: 24-31.
Direct Link | Yue, X., X. Qiu, Y. Ji and C. Zhang, 2009. P2P attack taxonomy and relationship analysis. Proceedings of the 11th International Conference on Advanced Communication Technology (ICACT’09) Vol. 2, February 15-18, 2009, IEEE, Phoenix Park, South Korea, ISBN:978-89-5519-138-7, pp: 1207-1210.