Agent systems verification: systematic literature review and mapping

NA Bakar, A Selamat - Applied Intelligence, 2018 - Springer
Agent systems are distributed systems consist of agents that autonomously interact to each
other in an environment to perform tasks and achieve goals. Performing verification is …

A temporal defeasible logic for handling access control policies

KE Sabri, N Obeid - Applied Intelligence, 2016 - Springer
Access control policies are specified within systems to ensure confidentiality of their
information. Available knowledge about policies is usually incomplete and uncertain. An …

Runtime verification of multi-agent systems interaction quality

NA Bakar, A Selamat - Intelligent Information and Database Systems: 5th …, 2013 - Springer
Since multi-agent systems are inherently complex, there are possibilities that errors related
to multi-agent systems interaction could occur. Currently, many verification approaches have …

Identifying implicit component interactions in distributed cyber-physical systems

J Jaskolka, J Villasenor - 2017 - scholarspace.manoa.hawaii.edu
Modern distributed systems and networks, like those found in cyber-physical system
domains such as critical infrastructures, contain many complex interactions among their …

Exploring covert channels

J Jaskolka, R Khedri - 2011 44th Hawaii International …, 2011 - ieeexplore.ieee.org
Covert channels pose a threat to system security for many reasons. One of the most
significant security concerns surrounding the use of covert channels in computer and …

An approach for identifying and analyzing implicit interactions in distributed systems

J Jaskolka, J Villasenor - IEEE Transactions on Reliability, 2017 - ieeexplore.ieee.org
Safety-critical system domains such as critical infrastructures, aerospace, automotive, and
industrial manufacturing and control are becoming increasingly dependent on the use of …

A lifetime-extending deployment strategy for multi-hop wireless sensor networks

SC Liu - 4th Annual Communication Networks and Services …, 2006 - ieeexplore.ieee.org
The issue of deployment strategy of sensor nodes to-extend the lifetime of a multi-hop
wireless sensor network is addressed. Based on load-balancing concept, an algorithm is …

An algebraic approach towards data cleaning

R Khedri, F Chiang, KE Sabri - Procedia Computer Science, 2013 - Elsevier
There has been a proliferation in the amount of data being generated and collected in the
past several years. One of the leading factors contributing to this increased data scale is …

A formulation of the potential for communication condition using C2KA

J Jaskolka, R Khedri - arXiv preprint arXiv:1408.5964, 2014 - arxiv.org
An integral part of safeguarding systems of communicating agents from covert channel
communication is having the ability to identify when a covert channel may exist in a given …

[HTML][HTML] Mitigating covert channels based on analysis of the potential for communication

J Jaskolka, R Khedri - Theoretical Computer Science, 2016 - Elsevier
The existence and usage of covert channels in systems of communicating agents poses a
significant threat to the confidentiality of information. It is difficult to fully prevent the …