Skip to main content

Research Repository

Advanced Search

Outputs (167)

Migration of mobile agents in ad-hoc wireless networks. (2004)
Presentation / Conference Contribution
Migas, N., Buchanan, W. J., & McArtney, K. (2004, May). Migration of mobile agents in ad-hoc wireless networks

This paper focuses on the design and development of a novel architecture called MARIAN, which utilises static agents, mobile agents, and also a hybrid approach, in order to perform routing, network discovery, and automatic network reconfiguration, in... Read More about Migration of mobile agents in ad-hoc wireless networks..

Covert channel analysis and detection using reverse proxy servers. (2004)
Presentation / Conference Contribution
Buchanan, W. J., & Llamas, D. (2004, June). Covert channel analysis and detection using reverse proxy servers. Paper presented at 3rd International Conference on Electronic Warfare and Security (EIWC)

Data hiding methods can be used by intruders to communicate over open data channels (Wolf 1989; McHugh 1995; deVivo, deVivo et al. 1999), and can be used to overcome firewalls, and most other forms of network intrusion detection systems. In fact, mos... Read More about Covert channel analysis and detection using reverse proxy servers..

MARIAN: A framework using mobile agents for routing, topology discovery and automatic network reconfiguration in ad-hoc networks. (2003)
Presentation / Conference Contribution
Migas, N., Buchanan, W. J., & McArtney, K. (2003). MARIAN: A framework using mobile agents for routing, topology discovery and automatic network reconfiguration in ad-hoc networks.

The purpose of MARIAN is to investigate the degree of suitability for mobile agent technology in routing, topology discovery, and automatic network reconfiguration in ad-hoc networks. This research proposes to assess different models of the usage of... Read More about MARIAN: A framework using mobile agents for routing, topology discovery and automatic network reconfiguration in ad-hoc networks..

Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks. (2003)
Presentation / Conference Contribution
Migas, N., Buchanan, W. J., & McArtney, K. (2003, April). Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks

Wireless networks and the usage of mobile devices are becoming popular in recent days, especially in creating ad-hoc networks. There is thus scope for developing mobile systems, where devices take an active part of creating a network infrastructure,... Read More about Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks..

Towards reusable and reconfigurable models for the WWW (2002)
Presentation / Conference Contribution
Brown, E., & Buchanan, W. (2002, August). Towards reusable and reconfigurable models for the WWW. Presented at 26th Annual International Computer Software and Applications, Oxford, UK

Reuse and component design have extensively been applied to software engineering, but reuse and formal design methods in WWW-based system is still in its infancy. Most WWW developers currently design WWW content for the most efficient delivery and do... Read More about Towards reusable and reconfigurable models for the WWW.

An intelligent agent security intrusion system (2002)
Presentation / Conference Contribution
Pikoulas, J., Buchanan, W., Mannion, M., & Triantafyllopoulos, K. (2002, April). An intelligent agent security intrusion system. Presented at Ninth Annual IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, Lund, Sweden

Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing network, thus they must be protected at different levels of the OSI mo... Read More about An intelligent agent security intrusion system.

An agent based Bayesian forecasting model for enhanced network security. (2001)
Presentation / Conference Contribution
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2001, April). An agent based Bayesian forecasting model for enhanced network security. Presented at ECBS 2001

Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and validation. They also tend to be centralized in their approach which makes... Read More about An agent based Bayesian forecasting model for enhanced network security..

Enhancing network management using mobile agents. (2000)
Presentation / Conference Contribution
Buchanan, W. J., Naylor, M., & Scott, A. (2000, April). Enhancing network management using mobile agents

Agent mobility addresses some limitations faced by classic client/server architecture, namely, in minimising bandwidth consumption, in supporting adaptive network load balancing and in solving problems caused by intermittent or unreliable network con... Read More about Enhancing network management using mobile agents..

Software agents and computer network security. (2000)
Presentation / Conference Contribution
Pikoulas, J., Mannion, M., & Buchanan, W. J. (2000, April). Software agents and computer network security

Preventing unauthorised access to corporate information systems is essential for many organisations. To address this problem we built a security enhancement software system using software agents, in which a core software agent resides on a server and... Read More about Software agents and computer network security..