Menu
Home
Contact us
Stats
Categories
Calendar
Toggle Wiki
Wiki Home
Last Changes
Rankings
List pages
Orphan pages
Sandbox
Print
Toggle Image Galleries
Galleries
Rankings
Toggle Articles
Articles home
List articles
Rankings
Toggle Blogs
List blogs
Rankings
Toggle Forums
List forums
Rankings
Toggle File Galleries
List galleries
Rankings
Toggle Maps
Mapfiles
Toggle Surveys
List surveys
Stats
MULTIAGENT APPLICATIONS IN SECURITY SYSTEMS: NEW PROPOSALS AND PERSPECTIVES
By: Vladimir Jotsov (3558 reads)
Rating: (1.00/10)

Abstract: The topic of the presented investigation is the contemporary threats, that will lead to big problems in the nearest future. The prevention of such threats is impossible without applications of intelligent agents.Even more, the multi-agent system should possess some features of knowledge discovery, web mining, collective evolutionary systems, and other advanced features which are impossible be applied in only one agent. Advantages and disadvantages of synthetic data mining methods are investigated, and obstacles are revealed to their distribution in information security systems. Original results for juxtaposing statistical vs. logical data mining methods aiming at possible evolutionary fusions are described, and recommendations are made on how to build more effective applications of classical and/or presented novel methods: caleidoscope, funnel, puzzle, frontal and contradiction. The usage of ontologies is investigated with the purpose of information transfer by sense in security agent environments or to reduce the computational complexity of practical applications. It is shown that humancentered methods are very suitable for resolutions in case, and often they are based on the usage of dynamic ontologies . Practical aspects of agent applications are discussed at the information security and/or the national security levels. Other cryptography applications, multiple software and e-learning research results are mentioned aiming to show that intelligent and classical technologies should be carefully combined in one software/hardware complex to achieve the goals of the security. It is shown that all the demonstrated advantages may be successfully combined with other known methods and information security techologies.

Key words: agent, knowledge discovery, data mining, web mining, ontology, information security systems, national security, human-centered systems, knowledge management, automation of creative processes, humanmachine brainstorming methods.

Link:

MULTIAGENT APPLICATIONS IN SECURITY SYSTEMS: NEW PROPOSALS AND PERSPECTIVES

Vladimir Jotsov

http://foibg.com/ibs_isc/ibs-16/ibs-16-p10.pdf

Print
Login
[ register | I forgot my password ]
World Clock
Powered by Tikiwiki Powered by PHP Powered by Smarty Powered by ADOdb Made with CSS Powered by RDF powered by The PHP Layers Menu System
RSS Wiki RSS Blogs rss Articles RSS Image Galleries RSS File Galleries RSS Forums RSS Maps rss Calendars
[ Execution time: 0.08 secs ]   [ Memory usage: 7.48MB ]   [ GZIP Disabled ]   [ Server load: 0.27 ]
Powered by Tikiwiki CMS/Groupware