共 50 条
- [21] Connection management using adaptive mobile agents INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-IV, PROCEEDINGS, 1998, : 802 - 809
- [23] Mobile agents for Web-based systems management INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY, 1999, 9 (05): : 360 - 371
- [24] Guarding Security Sensitive Content using Confined Mobile Agents APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 48 - 55
- [25] ABADAM: A security model to databases access using mobile agents INGENIERIA, 2008, 13 (01): : 58 - 66
- [26] Security Measures in Complex Multiagent Systems Composed from Mobile Agents COMPLEXITY IN ARTIFICIAL AND NATURAL SYSTEMS, PROCEEDINGS, 2008, : 47 - 55
- [27] Checkpointing using mobile agents in distributed systems ICCTA 2007: INTERNATIONAL CONFERENCE ON COMPUTING: THEORY AND APPLICATIONS, PROCEEDINGS, 2007, : 39 - +
- [28] Security Vulnerability and Robust Security Requirements using Key Management in Sensor Network INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 23 - 28
- [29] Uncertainty in Security: Using Systems Engineering Approaches for Robust System Security Requirements 1600, John Wiley and Sons Inc (16):