نتایج جستجو برای: antivirus update agent system
تعداد نتایج: 2473140 فیلتر نتایج به سال:
Recently, several approaches for updating knowledge bases represented as logic programs have been proposed. We present a generic framework for declarative specifications of update policies, which is built upon such approaches. It extends the LUPS language for update specifications, and incorporates the notion of events into the framework. An update policy allows an agent to flexibly react upon ...
Recently, several approaches for updating knowledge bases represented as logic programs have been proposed. In this paper, we present a generic framework for declarative specifications of update policies, which is built upon such approaches. It extends the LUPS language for update specifications and incorporates the notion of events into the framework. An update policy allows an agent to flexib...
We give a model for a multi-agent system which describes how the knowledge and beliefs of agents should change when they receive new information. The formal tool we use for this description is a combination of modal and dynamic logic. Two core notions in our model of belief update are the expansion of the knowledge and beliefs of an agent, and the processing of new information by an agent. An e...
Document title FIPA Abstract Architecture Specification Document number PC00001D Document source FIPA TC Architecture Document status Preliminary Date of this status 2000/10/19 Supersedes None Contact [email protected] Change history 2000/02/15 While this is the first version of this document published under the new document control system, it an update from earlier drafts of this document. The cha...
Document title FIPA Abstract Architecture Specification Document number PC00001D Document source FIPA TC Architecture Document status Preliminary Date of this status 2000/10/19 Supersedes None Contact [email protected] Change history 2000/02/15 While this is the first version of this document published under the new document control system, it an update from earlier drafts of this document. The cha...
Abstract Malware analysts, and in particular antivirus vendors, never agreed on a single naming convention for malware specimens. This leads to confusion and difficulty—more for researchers than for practitioners—for example, when comparing coverage of different antivirus engines, when integrating and systematizing known threats, or comparing the classifications given by different detectors. Cl...
This demonstration showcases a virtual agent, Mr. Clue, capable of acting in the role of clue-giver in a wordguessing game. The agent has the ability to automatically generate clues and update its dialogue policy dynamically based on user input.
Malware, short for “Malicious Software”, is a program specifically designed to perform an activity that can harm software on victim's device. Examples of commonly found malware include trojans, ransomware and downloaders. It important computer users recognize avoid when using devices. Therefore, overcome attacks by protection devices Antivirus prevent, find, detect, remove the types have been m...
The system that monitors the events occurring in a computer system or a network and analyzes the events for sign of intrusions is known as intrusion detection system. The performance of the intrusion detection system can be improved by combing anomaly and misuse analysis. This chapter proposes an ensemble multi-agent-based intrusion detection model. The proposed model combines anomaly, misuse, ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید