{"id":"https://openalex.org/W2070062566","doi":"https://doi.org/10.1108/09685220510602022","title":"Mitigating the mobile agent malicious host problem by using communication patterns","display_name":"Mitigating the mobile agent malicious host problem by using communication patterns","publication_year":2005,"publication_date":"2005-06-22","ids":{"openalex":"https://openalex.org/W2070062566","doi":"https://doi.org/10.1108/09685220510602022","mag":"2070062566"},"language":"en","primary_location":{"id":"doi:10.1108/09685220510602022","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685220510602022","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032961897","display_name":"Ingo Stengel","orcid":null},"institutions":[{"id":"https://openalex.org/I4210100923","display_name":"Munster Technological University","ror":"https://ror.org/013xpqh61","country_code":"IE","type":"facility","lineage":["https://openalex.org/I4210100923"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"I. Stengel","raw_affiliation_strings":["Cork Institute of Technology, Cork, Ireland and Institute for Graphic Data Processing, University of Applied Sciences, Darmstadt, Germany","(Cork Institute of Technology, Cork, Ireland and Institute for Graphic Data Processing, University of Applied Sciences, Darmstadt, Germany)"],"affiliations":[{"raw_affiliation_string":"Cork Institute of Technology, Cork, Ireland and Institute for Graphic Data Processing, University of Applied Sciences, Darmstadt, Germany","institution_ids":["https://openalex.org/I4210100923"]},{"raw_affiliation_string":"(Cork Institute of Technology, Cork, Ireland and Institute for Graphic Data Processing, University of Applied Sciences, Darmstadt, Germany)","institution_ids":["https://openalex.org/I4210100923"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109909335","display_name":"Klaus Fischer","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"K.P. Fischer","raw_affiliation_strings":["Digamma Communication Consulting GmbH, Darmstadt, Germany","(Digamma Communication Consulting GmbH, Darmstadt, Germany)"],"affiliations":[{"raw_affiliation_string":"Digamma Communication Consulting GmbH, Darmstadt, Germany","institution_ids":[]},{"raw_affiliation_string":"(Digamma Communication Consulting GmbH, Darmstadt, Germany)","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008047608","display_name":"Udo Bleimann","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"U. Bleimann","raw_affiliation_strings":["Aida Institute of Applied Informatics, Darmstadt, Germany","(Aida Institute of Applied Informatics, Darmstadt, Germany)"],"affiliations":[{"raw_affiliation_string":"Aida Institute of Applied Informatics, Darmstadt, Germany","institution_ids":[]},{"raw_affiliation_string":"(Aida Institute of Applied Informatics, Darmstadt, Germany)","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069121056","display_name":"Jeanne Stynes","orcid":null},"institutions":[{"id":"https://openalex.org/I4210100923","display_name":"Munster Technological University","ror":"https://ror.org/013xpqh61","country_code":"IE","type":"facility","lineage":["https://openalex.org/I4210100923"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"J. Stynes","raw_affiliation_strings":["Cork Institute of Technology, Cork, Ireland","Cork Institute of Technology , Cork , Ireland"],"affiliations":[{"raw_affiliation_string":"Cork Institute of Technology, Cork, Ireland","institution_ids":["https://openalex.org/I4210100923"]},{"raw_affiliation_string":"Cork Institute of Technology , Cork , Ireland","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5032961897"],"corresponding_institution_ids":["https://openalex.org/I4210100923"],"apc_list":null,"apc_paid":null,"fwci":0.2595,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.63962047,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"3","first_page":"203","last_page":"211"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.975600004196167,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.8617235422134399},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.7296708822250366},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6976557970046997},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.673043966293335},{"id":"https://openalex.org/keywords/mobile-agent","display_name":"Mobile agent","score":0.6602335572242737},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.554862916469574},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.47390925884246826},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.32891014218330383},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.18982920050621033}],"concepts":[{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.8617235422134399},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.7296708822250366},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6976557970046997},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.673043966293335},{"id":"https://openalex.org/C84875433","wikidata":"https://www.wikidata.org/wiki/Q3277848","display_name":"Mobile agent","level":2,"score":0.6602335572242737},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.554862916469574},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.47390925884246826},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.32891014218330383},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.18982920050621033},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/09685220510602022","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685220510602022","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W50542560","https://openalex.org/W1501208926","https://openalex.org/W1513248457","https://openalex.org/W1518545579","https://openalex.org/W1570296326","https://openalex.org/W1593602921","https://openalex.org/W1826416047","https://openalex.org/W1919882459","https://openalex.org/W2000790448","https://openalex.org/W2060189343","https://openalex.org/W2104799982","https://openalex.org/W2109995333","https://openalex.org/W2123335034","https://openalex.org/W2155020798","https://openalex.org/W6602118407","https://openalex.org/W6630096095","https://openalex.org/W6639978954","https://openalex.org/W6665549558","https://openalex.org/W6676229655","https://openalex.org/W6678327867"],"related_works":["https://openalex.org/W2593155302","https://openalex.org/W2041415459","https://openalex.org/W2072812638","https://openalex.org/W3126095231","https://openalex.org/W2352855287","https://openalex.org/W2378906650","https://openalex.org/W2384288445","https://openalex.org/W2382526412","https://openalex.org/W4200071106","https://openalex.org/W2312090451"],"abstract_inverted_index":{"Purpose":[0],"This":[1,72],"paper":[2,73],"seeks":[3],"to":[4,8,62,77],"describe":[5],"an":[6,29],"approach":[7],"mitigate":[9],"the":[10,34,41,50,53],"unsoluble":[11],"malicious":[12,35,55],"host":[13,36,56],"problem.":[14],"Design/methodology/approach":[15],"By":[16],"using":[17],"obfuscation":[18],"as":[19],"a":[20],"component":[21],"of":[22,31],"communication":[23],"patterns":[24],"and":[25,40,83],"their":[26],"switching":[27],"in":[28,80],"environment":[30],"cooperating":[32],"agents":[33,43],"can":[37,44,57],"be":[38,45,58,75],"detected":[39,54],"attacked":[42],"deleted.":[46],"Findings":[47],"Finds":[48],"that":[49],"information":[51,81],"about":[52],"used":[59],"further,":[60],"e.g.":[61],"prevent":[63],"another":[64],"mobile":[65],"agent":[66],"from":[67],"visiting":[68],"this":[69],"host.":[70],"Originality/value":[71],"will":[74],"helpful":[76],"people":[78],"involved":[79],"management":[82],"computer":[84],"security":[85],"issues.":[86]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
