نتایج جستجو برای: antivirus update agent system

تعداد نتایج: 2473140  

2004
Thomas Eiter Michael Fink Giuliana Sabbatini Hans Tompits

Recently, several approaches for updating knowledge bases represented as logic programs have been proposed. We present a generic framework for declarative specifications of update policies, which is built upon such approaches. It extends the LUPS language for update specifications, and incorporates the notion of events into the framework. An update policy allows an agent to flexibly react upon ...

2001
Thomas Eiter Michael Fink Giuliana Sabbatini Hans Tompits

Recently, several approaches for updating knowledge bases represented as logic programs have been proposed. In this paper, we present a generic framework for declarative specifications of update policies, which is built upon such approaches. It extends the LUPS language for update specifications and incorporates the notion of events into the framework. An update policy allows an agent to flexib...

1999
Jan-Willem Roorda

We give a model for a multi-agent system which describes how the knowledge and beliefs of agents should change when they receive new information. The formal tool we use for this description is a combination of modal and dynamic logic. Two core notions in our model of belief update are the expansion of the knowledge and beliefs of an agent, and the processing of new information by an agent. An e...

2000

Document title FIPA Abstract Architecture Specification Document number PC00001D Document source FIPA TC Architecture Document status Preliminary Date of this status 2000/10/19 Supersedes None Contact [email protected] Change history 2000/02/15 While this is the first version of this document published under the new document control system, it an update from earlier drafts of this document. The cha...

2000

Document title FIPA Abstract Architecture Specification Document number PC00001D Document source FIPA TC Architecture Document status Preliminary Date of this status 2000/10/19 Supersedes None Contact [email protected] Change history 2000/02/15 While this is the first version of this document published under the new document control system, it an update from earlier drafts of this document. The cha...

2011
Federico Maggi Andrea Bellini Guido Salvaneschi Stefano Zanero

Abstract Malware analysts, and in particular antivirus vendors, never agreed on a single naming convention for malware specimens. This leads to confusion and difficulty—more for researchers than for practitioners—for example, when comparing coverage of different antivirus engines, when integrating and systematizing known threats, or comparing the classifications given by different detectors. Cl...

2014
Eli Pincus David DeVault David Traum

This demonstration showcases a virtual agent, Mr. Clue, capable of acting in the role of clue-giver in a wordguessing game. The agent has the ability to automatically generate clues and update its dialogue policy dynamically based on user input.

Journal: :Journal of Information System Research (JOSH) 2023

Malware, short for “Malicious Software”, is a program specifically designed to perform an activity that can harm software on victim's device. Examples of commonly found malware include trojans, ransomware and downloaders. It important computer users recognize avoid when using devices. Therefore, overcome attacks by protection devices Antivirus prevent, find, detect, remove the types have been m...

2015
Tarek Helmy

The system that monitors the events occurring in a computer system or a network and analyzes the events for sign of intrusions is known as intrusion detection system. The performance of the intrusion detection system can be improved by combing anomaly and misuse analysis. This chapter proposes an ensemble multi-agent-based intrusion detection model. The proposed model combines anomaly, misuse, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید