共 71 条
- [1] Alami-Kamouri S(2020)Mobile agent security based on cryptographic trace and SOS agent mechanisms J. Commun. 15 221-230
- [2] Moukafih N(2020)Dummy-based approach for protecting mobile agents against malicious destination machines IEEE Access 8 129320-129337
- [3] Orhanou G(2017)A biological immune system (bis) inspired mobile agent platform (map) security architecture Expert Syst. Appl. 72 269-282
- [4] Elhajji S(2016)Mobile agent-based software systems modeling approaches: a comparative study J. Comput. Inf. Technol. 24 149-163
- [5] Alluhaybi B(2008)Jade A software framework for developing multi-agent applications lessons learned Inf. Softw. Technol. 50 10-21
- [6] Alrahhal MS(2009)A security-aware metamodel for multi-agent systems (mas) Inf. Softw. Technol. 51 832-845
- [7] Alzahrani A(2014)Intelligent software agent technology: an overview Int. J. Comput. Appl. 89 19-31
- [8] Thayananthan V(2009)Evaluating the security of mobile agent platforms Auton. Agent. Multi-Agent Syst. 18 295-311
- [9] Bagga P(2006)Path-history-based access control for mobile agents Int. J. Parallel, Emerg. Distrib. Syst. 21 215-225
- [10] Hans R(2009)Ma-uml: a conceptual approach for mobile agents’ modelling Int. J. Agent-Oriented Softw. Eng. 3 277-305