-
Notifications
You must be signed in to change notification settings - Fork 0
/
refs.bib
133 lines (126 loc) · 8.53 KB
/
refs.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
@article{9207929,
author={Palanca, Javier and Terrasa, Andrés and Julian, Vicente and Carrascosa, Carlos},
journal={IEEE Access},
title={SPADE 3: Supporting the New Generation of Multi-Agent Systems},
year={2020},
volume={8},
number={},
pages={182537-182549},
doi={10.1109/ACCESS.2020.3027357}
}
@inproceedings{10.1109/AICCSA.2010.5587036,
author = {Bonhomme, Cedric and Feltus, Christophe and Khadraoui, Djamel},
title = {A Multi-Agent Based Decision Mechanism for Incident Reaction in Telecommunication Network},
year = {2010},
isbn = {9781424477166},
publisher = {IEEE Computer Society},
address = {USA},
url = {https://doi.org/10.1109/AICCSA.2010.5587036},
doi = {10.1109/AICCSA.2010.5587036},
abstract = {The paper provides a global architectural and decision support solution for a reaction after alert detection mechanisms in the frame of information systems security applied to telecom infrastructures. Therefore, the architecture is developed in a distributed perspective and is composed of three basic layers: the low level that constitutes the interface between the architecture and the infrastructure. The intermediate level that is responsible of correlating the alerts coming from different domains of the infrastructure and to deploy the reaction actions. The architecture is elaborated using a MAS associated to the OntoBayes model for decision mechanism. This model helps agents to make decisions according to preference values and is built upon ontology based knowledge sharing, Bayesian networks based uncertainty management and influence diagram. The major novelty of this Decision Support System is the layered view of the infrastructure thanks to MAS architecture, which enables the decision making with different levels of knowledge.},
booktitle = {Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010},
pages = {1–2},
numpages = {2},
series = {AICCSA '10}
}
@inproceedings{10.1109/ARES.2011.43,
author = {Bonhomme, Cedric and Feltus, Christophe and Petit, Micha\"{e}l},
title = {Dynamic Responsibilities Assignment in Critical Electronic Institutions - A Context-Aware Solution for in Crisis Access Right Management},
year = {2011},
isbn = {9780769544854},
publisher = {IEEE Computer Society},
address = {USA},
url = {https://doi.org/10.1109/ARES.2011.43},
doi = {10.1109/ARES.2011.43},
booktitle = {Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security},
pages = {248–253},
numpages = {6},
series = {ARES '11}
}
@inproceedings{10.1109/WI-IAT.2011.194,
author = {Guemkam, Guy and Feltus, Christophe and Schmitt, Pierre and Bonhomme, Cedric and Khadraoui, Djamel and Guessoum, Zahia},
title = {Reputation Based Dynamic Responsibility to Agent Assignement for Critical Infrastructure},
year = {2011},
isbn = {9780769545134},
publisher = {IEEE Computer Society},
address = {USA},
url = {https://doi.org/10.1109/WI-IAT.2011.194},
doi = {10.1109/WI-IAT.2011.194},
abstract = {Power distribution constitutes a critical service for our economy. To foreseen electricity overload and risks of power blackout according to external perturbations such as the weather, the temperature or the barometric pressure in real time is a crucial challenge. In order to face those problems, research tends to involve consumers in the utilization of the electricity based on weather conditions. Our previous works had proposed an agent based architecture to support this alert mechanism. The architecture exploited a static assignment of functions to agents. That static assignment was a weak point because isolating an agent or breaking the communication channel between two of them created serious damage on the crisis management. In this paper, we complete our previous works and make dynamic the assignment of functions mobile for agents. Our approach exploits the concept of agent responsibility that we dynamically assigned to the agent taking into consideration the agent's reputation.},
booktitle = {Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 02},
pages = {272–275},
numpages = {4},
series = {WI-IAT '11}
}
@inproceedings{DBLP:conf/IEEEias/OuedraogoMHBKDP11,
author = {Moussa Ouedraogo and
Haralambos Mouratidis and
Artur Hecker and
C{\'{e}}dric Bonhomme and
Djamel Khadraoui and
Eric Dubois and
David Preston},
title = {A new approach to evaluating security assurance},
booktitle = {7th International Conference on Information Assurance and Security,
{IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
pages = {215--221},
publisher = {{IEEE}},
year = {2011},
url = {https://doi.org/10.1109/ISIAS.2011.6122822},
doi = {10.1109/ISIAS.2011.6122822},
timestamp = {Thu, 14 Oct 2021 10:34:17 +0200},
biburl = {https://dblp.org/rec/conf/IEEEias/OuedraogoMHBKDP11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/SchmittBAG10,
author = {Pierre Schmitt and
C{\'{e}}dric Bonhomme and
Jocelyn Aubert and
Benjamin G{\^{a}}teau},
editor = {Pnina Soffer and
Erik Proper},
title = {Programming Electronic Institutions with Utopia},
booktitle = {Information Systems Evolution - CAiSE Forum 2010, Hammamet, Tunisia,
June 7-9, 2010, Selected Extended Papers},
series = {Lecture Notes in Business Information Processing},
volume = {72},
pages = {122--135},
publisher = {Springer},
year = {2010},
url = {https://doi.org/10.1007/978-3-642-17722-4\_9},
doi = {10.1007/978-3-642-17722-4\_9},
timestamp = {Thu, 14 Oct 2021 10:18:39 +0200},
biburl = {https://dblp.org/rec/conf/caise/SchmittBAG10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{10.1145/2994539.2994542,
author = {Wagner, Cynthia and Dulaunoy, Alexandre and Wagener, G\'{e}rard and Iklody, Andras},
title = {MISP: The Design and Implementation of a Collaborative Threat Intelligence Sharing Platform},
year = {2016},
isbn = {9781450345651},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/2994539.2994542},
doi = {10.1145/2994539.2994542},
abstract = {The IT community is confronted with incidents of all kinds and nature, new threats appear on a daily basis. Fighting these security incidents individually is almost impossible. Sharing information about threats among the community has become a key element in incident response to stay on top of the attackers. Reliable information resources, providing credible information, are therefore essential to the IT community, or even at broader scale, to intelligence communities or fraud detection groups. This paper presents the Malware Information Sharing Platform (MISP) and threat sharing project, a trusted platform, that allows the collection and sharing of important indicators of compromise (IoC) of targeted attacks, but also threat information like vulnerabilities or financial indicators used in fraud cases. The aim of MISP is to help in setting up preventive actions and counter-measures used against targeted attacks. Enable detection via collaborative-knowledge-sharing about existing malware and other threats.},
booktitle = {Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security},
pages = {49–56},
numpages = {8},
keywords = {incident response, trust, IT security, threat intelligence management, collaborative information sharing},
location = {Vienna, Austria},
series = {WISCS '16}
}
@misc{rfc3161,
series = {Request for Comments},
number = 3161,
howpublished = {RFC 3161},
publisher = {RFC Editor},
doi = {10.17487/RFC3161},
url = {https://www.rfc-editor.org/info/rfc3161},
author = {Robert Zuccherato and Patrick Cain and Dr. Carlisle Adams and Denis Pinkas},
title = {{Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)}},
pagetotal = 26,
year = 2001,
month = aug,
abstract = {This document describes the format of a request sent to a Time Stamping Authority (TSA) and of the response that is returned. It also establishes several security-relevant requirements for TSA operation, with regards to processing requests to generate responses. {[}STANDARDS-TRACK{]}},
}