Delegation to artificial agents fosters prosocial behaviors in the collective risk dilemma

E Fernández Domingos, I Terrucha, R Suchon… - Scientific reports, 2022 - nature.com
Home assistant chat-bots, self-driving cars, drones or automated negotiation systems are
some of the several examples of autonomous (artificial) agents that have pervaded our …

Learning communication patterns for malware discovery in HTTPs data

J Kohout, T Komárek, P Čech, J Bodnár… - Expert Systems with …, 2018 - Elsevier
Encrypted communication on the Internet using the HTTPs protocol represents a challenging
task for network intrusion detection systems. While it significantly helps to preserve users' …

An information source selection model based on evolutionary game theory

X Deng, W Jiang, Z Wang - Applied Mathematics and Computation, 2020 - Elsevier
Abstract Information source selection (ISS) is ubiquitous across a myriad of scientific
disciplines. Previous studies mainly viewed the issue of ISS as a multi-criteria decision …

Delegation to autonomous agents promotes cooperation in collective-risk dilemmas

EF Domingos, I Terrucha, R Suchon, J Grujić… - arXiv preprint arXiv …, 2021 - arxiv.org
Home assistant chat-bots, self-driving cars, drones or automated negotiations are some of
the several examples of autonomous (artificial) agents that have pervaded our society …

Deriving behavior primitives from aggregate network features using support vector machines

O McCusker, S Brunza… - 2013 5th International …, 2013 - ieeexplore.ieee.org
Establishing long-view situation awareness of threat agents requires an operational
capability that scales to large volumes of network data, leveraging the past to make-sense of …

Threat-model-driven runtime adaptation and evaluation of intrusion detection system

M Rehak, E Staab, V Fusenig, J Stiborek… - Proceedings of the 6th …, 2009 - dl.acm.org
We present a mechanism for autonomous self-adaptation of a network-based intrusion
detection system (IDS). The system is composed of a set of cooperating agents, each of …

Mobility in collaborative alert systems: Building trust through reputation

M Gil Pérez, F Gómez Mármol… - … : International IFIP TC 6 …, 2011 - Springer
Abstract Collaborative Intrusion Detection Networks (CIDN) are usually composed by a set
of nodes working together to detect distributed intrusions that cannot be easily recognized …

Game theoretical adaptation model for intrusion detection system

J Stiborek, M Grill, M Rehak, K Bartos… - Advances on Practical …, 2012 - Springer
We present a self-adaptation mechanism for Network Intrusion Detection System which uses
a game-theoretical mechanism to increase system robustness against targeted attacks on …

[PDF][PDF] Game theoretical adaptation model for intrusion detection system

M Rehak, M Pechoucek, M Grill… - The 10th International …, 2011 - aamas.csc.liv.ac.uk
We present a self-adaptation mechanism for Network Intrusion Detection System which uses
a game-theoretical mechanism to increase system robustness against targeted attacks on …

Мультиагентна система безперебійного моніторингу комп'ютерних мереж

ВР Пархоменко - 2024 - ela.kpi.ua
Анотація Розмір пояснювальної записки–92 аркуші, містить 14 ілюстрацій, 32 таблиці, 3
додатки, 26 посилань на джерела. Актуальність теми. Локальні комп'ютерні мережі …