IEEE International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems - Proceedings374-38185OR
As distributed computer systems become more and more available, its role in science and society nece...
Research on Agents and Multi-Agent Systems has matured during the last decade and many effective app...
This article presents the model of a multi-agent system (SMAF), which objectives are the input of fu...
The Data Distribution Management (DDM) service is one of the six services provided in the Runtime In...
In Proceedings of IEEE International Conference on Distributed Computing Systems (IEEE ICDCS), July ...
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics32028-2033PICY
Recently, a serious disturbance for network security could be a Distributed Denial of Service (DDoS)...
Abstract—To the security threats existed in Neighbor Discovery Protocol(NDP) of IPv6, the paper prov...
Abstract: The paper considers an approach to modeling and simulation of cyber-wars in Internet betwe...
Data filtering is one of the techniques that can help achieve real-time linkage in large-scale distr...
Item does not contain fulltext2008 IEEE/WIC/ACM International Conference on Web Intelligence and Int...
Abstract: The server resources are abnormally consumed by the attackers using the denial-if service ...
This is the author’s version of a work that was submitted/accepted for pub-lication in the following...
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics3III-101PICY
Publish/subscribe middleware provides efficient support for loosely coupled communication in distrib...
As distributed computer systems become more and more available, its role in science and society nece...
Research on Agents and Multi-Agent Systems has matured during the last decade and many effective app...
This article presents the model of a multi-agent system (SMAF), which objectives are the input of fu...
The Data Distribution Management (DDM) service is one of the six services provided in the Runtime In...
In Proceedings of IEEE International Conference on Distributed Computing Systems (IEEE ICDCS), July ...
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics32028-2033PICY
Recently, a serious disturbance for network security could be a Distributed Denial of Service (DDoS)...
Abstract—To the security threats existed in Neighbor Discovery Protocol(NDP) of IPv6, the paper prov...
Abstract: The paper considers an approach to modeling and simulation of cyber-wars in Internet betwe...
Data filtering is one of the techniques that can help achieve real-time linkage in large-scale distr...
Item does not contain fulltext2008 IEEE/WIC/ACM International Conference on Web Intelligence and Int...
Abstract: The server resources are abnormally consumed by the attackers using the denial-if service ...
This is the author’s version of a work that was submitted/accepted for pub-lication in the following...
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics3III-101PICY
Publish/subscribe middleware provides efficient support for loosely coupled communication in distrib...
As distributed computer systems become more and more available, its role in science and society nece...
Research on Agents and Multi-Agent Systems has matured during the last decade and many effective app...
This article presents the model of a multi-agent system (SMAF), which objectives are the input of fu...