2013
DOI: 10.1016/j.csi.2012.10.003
|View full text |Cite
|
Sign up to set email alerts
|

Artificial immune system based mobile agent platform protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…In spite of recent popularity of the above mentioned techniques and extensive academic research, there is a need to exploit this knowledge of the system in detection of operational behaviour since sensors are been controlled in real-time similar to how the human body immune system detects and removes or destroys threats from numerous pathogens such as viruses, bacteria and parasites [26,33]. Various techniques and models have been developed and applied in securing Information system infrastructures such as ICS devices and different network devices and platforms against APT and cyber threats.…”
Section: Introductionmentioning
confidence: 99%
“…In spite of recent popularity of the above mentioned techniques and extensive academic research, there is a need to exploit this knowledge of the system in detection of operational behaviour since sensors are been controlled in real-time similar to how the human body immune system detects and removes or destroys threats from numerous pathogens such as viruses, bacteria and parasites [26,33]. Various techniques and models have been developed and applied in securing Information system infrastructures such as ICS devices and different network devices and platforms against APT and cyber threats.…”
Section: Introductionmentioning
confidence: 99%
“…The scanner provides an alarm to the DM if any suspected content exists. An immune system is proposed in [51]. Actually, the work [51] is considered a development of the work [50], where performance was the axis of the enhancement.…”
Section: )mentioning
confidence: 99%
“…An immune system is proposed in [51]. Actually, the work [51] is considered a development of the work [50], where performance was the axis of the enhancement. The key idea is to employ the pipelining concept in scanning, predicting, and extracting the malicious piece of code.…”
Section: )mentioning
confidence: 99%
See 1 more Smart Citation
“…Afterwards, unknown tokens are executed and tested in an isolated environment to check for their malicious intentions and updates the KB containing malicious codes, with the newly diagnosed (if any) vicious code. In order to fend off this waiting time of the agent, Venkatesan et al [20] further included the agent clones to handle multiple incoming agents simultaneously. Additionally, the pipelining concept was introduced by separating the operations i.e.…”
mentioning
confidence: 99%