Eng During last 365 days Approved articles: 1938,   Articles in work: 308 Declined articles: 749 
Library
Articles and journals | Tariffs | Payments | Your profile

Back to contents

Lyapustin Anton

Post-graduate student, department of Design and Safety of Computer Systems

197101, Russia, Sankt-Peterburg, g. Sankt-Peerburg, Kronverkskii pr., 49, Universitet ITMO

Lyapustinae@gmail.com

 

 
Kolesnikova Svetlana

Postgraduate Student, Department of Computer Security Systems Design, University of ITMO

197101, Russia, Saint Petersburg, g. Saint Petersburg, Kronverkskii pr., 49, Universitet ITMO

kolesnikovasy@corp.ifmo.ru

 

 
Mel'nik Danil

Postgraduate Student, Department of Computer Security Systems Design, University of ITMO

191186, Russia, Saint Petersburg, g. Saint Petersburg, ul. Bol'shaya Morskaya, 24, of. 101

melnikdanil@gmail.com

 

 

Abstract.


Keywords: information security, threat detection, intelligent protection system, multiagent platform, heterogeneous information platforms, threat detection agent, analysis systems, detection algorithms, agent platform, multi-agent system

DOI:

10.7256/2454-0714.2018.3.26575

Article was received:

11-06-2018


Review date:

13-06-2018


Publish date:

11-10-2018


This article written in Russian. You can find full text of article in Russian here .

References
1.
Lange D.B., Mitsuru O. Seven good reasons for mobile agents // Communications of the ACM. 1999.-Vol.42 3. P. 88-89.
2.
Specification for the Advanced Encryption Standard (AES): Federal Information Processing Standards Publication 197. National Institute of Standards and Technology (NIST), 2001.
3.
Barker W.C. Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher.-National Institute of Standards and Technology (NIST), 2008.
4.
Schneier B., et al. Twofish: A 128-bit Block Cipher /In: 1st AES Conference, 1998.
5.
Wheeler D., Needham R. TEA, a Tine Encryption Algorithm. Cambridge Security Workshop Proceedings. 1994.-809. P. 363-369.
6.
Schneier B. Description of a New Variable-Length Key, 64-bit Block Cipher. Cambridge Security Workshop Proceedings, 1994. P. 340-346.
7.
A Security Scan Tool returns SSL Server Support Weak Encryption Vulnerability.-http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg21384688.
8.
Grimley M.J., Monroe B.D. Protecting the integrity of agents^ an exploration into letting agents loose in an unpredictable world //Communications of the ACM. 1999.-Vol.5. P. 10-17.
9.
Roth V. On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection /In: Proceedings of the 5th International Conference on Autonomous agents, 2001