[1]
|
W. Lee and S. Stolfo, “A Framework for Constructing Features and Models for Intrusion Detection Systems,” ACM Transactions on Information and Systems Security, Vol. 3, No. 4, 2000, pp. 227-261.
|
[2]
|
K. Tabia, “Graphical Models and Behavioral Approaches for Intrusions’ Detection,” Ph.D. Thesis, University of Artois, Arras, 2008.
|
[3]
|
M. Eid, “A New Mobile Agent-Based Intrusion Detection System Using Distributed Sensors,” American University of Beirut, Department of Electrical and Computer Engineering, Washington DC, 2004.
|
[4]
|
G. B. Fopak, “MAMDIR: A Mobile Agent Model of Network Incidents Diagnosis,” Master 2 of Research Thesis, National Advanced of Engineering, Unviersity of Yaoundé 1, Yaounde, 2011.
|
[5]
|
J. Ferber, “Multi-Agent Systems. An Introduction to Distributed Artificial Intelligence,” Addison Wesley, Boston, 1999.
|
[6]
|
M. Tchikou, “A Multiagents Design Environment for the Piloting of Production Systems,” Master’s Thesis, University of Pau and Pays de l’Adour, France, 2004.
|
[7]
|
G. Picard, “Development Methodology of Adaptative Multi-Agents Systems and Design of Software with Emerging Functionalities,” Ph.D. Thesis, University Paul Sabatier of Toulouse III, France, 2004.
|
[8]
|
J. B. Voron, “Automatic and et Particularized Construction of Intrusion Detection Systems for Parallel Systems Based on Petri Networks,” Ph.D. Thesis, University Pierre et Marie Curie, France, 2009.
|
[9]
|
S. F. Wu et al., “JiNao: Design and Implementation of a Scalable Intrusion Detection System for the OSPF Routing Protocol,” IEEE Workshop on Information Assurance and Security, West Point, June 2001, pp. 91-99.
|
[10]
|
W. Emmerich, “Engineering Distributed Objets,” John Wiley & Sons Ltd., Chichester, 2000.
|
[11]
|
J. P. Sansonnet, “Parallel Architectures Online Course,” 2011. www.limsi.fr/~/enseignementtutoriels/archi/archi.html
|
[12]
|
D. E. Denning, “An Intrusion-Detection Model,” IEEE Transactions on Software Engineering, Vol. SE-13, No. 2, 1987, pp. 222-232.
|
[13]
|
K. Boudaoud, “Networks Security Management: A New Approach by Multi-Agents System,” University of de Geniva, Geniva, 2001.
|
[14]
|
Percher et al., “Intrusions Detection in Ad Hoc Network,” West Higher Ectronic School (ESEO), France, 2004.
|