2020
DOI: 10.1080/12460125.2020.1848373
|View full text |Cite
|
Sign up to set email alerts
|

Software agents supporting the security of IT systems handling personal information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…User behaviors can be assessed and profiled, owing to the availability of a database of potential attack patterns and an algorithm for their investigation. While the relevance of artificial intelligence in IDS/IPS design has been demonstrated by a number of works [32][33][34][35][36], the limitations emphasized by [37] gives a proposal of a system/user assessment mechanism where the user-data-protection algorithm involves the use of software agents. In addition, the results reported in [37] showed that the method can be effective in building user-behavior profiles.…”
Section: Reference-system Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…User behaviors can be assessed and profiled, owing to the availability of a database of potential attack patterns and an algorithm for their investigation. While the relevance of artificial intelligence in IDS/IPS design has been demonstrated by a number of works [32][33][34][35][36], the limitations emphasized by [37] gives a proposal of a system/user assessment mechanism where the user-data-protection algorithm involves the use of software agents. In addition, the results reported in [37] showed that the method can be effective in building user-behavior profiles.…”
Section: Reference-system Architecturementioning
confidence: 99%
“…While the relevance of artificial intelligence in IDS/IPS design has been demonstrated by a number of works [32][33][34][35][36], the limitations emphasized by [37] gives a proposal of a system/user assessment mechanism where the user-data-protection algorithm involves the use of software agents. In addition, the results reported in [37] showed that the method can be effective in building user-behavior profiles. The artificial intelligence algorithm proposed in this article is an extension of that approach and is to be applied in profiling the operations of a smart grid.…”
Section: Reference-system Architecturementioning
confidence: 99%
“…Hopes for a breakthrough may be reasonably associated with the application of ontologies in conjunction with multi-agent systems. Work on such solutions has already commenced (Drozdowicz, Paprzycki, and Ganzha 2020;Żytniewski and Stanek 2020;Skorupka, Żytniewski, and Stanek, 2018).…”
Section: Introductionmentioning
confidence: 99%