Intelligent agent technology within information warfare

Busuttil, T. B. and Warren, Matthew 2001, Intelligent agent technology within information warfare, Journal of information warfare, vol. 1, no. 2, pp. 52-61.

Attached Files
Name Description MIMEType Size Downloads

Title Intelligent agent technology within information warfare
Author(s) Busuttil, T. B.
Warren, MatthewORCID iD for Warren, Matthew
Journal name Journal of information warfare
Volume number 1
Issue number 2
Start page 52
End page 61
Publisher Mindsystems
Place of publication Melbourne, Vic.
Publication date 2001
ISSN 1445-3312
Summary Research into Intelligent Agent (IA) technology and how it can assist computer systems in the autonomous completion of common office and home computing tasks is extremely widespread. The use oflA's is becoming more feasible as the functionality moves Into line with what users require for their everyday computing needs. However, this does not mean that IA technology cannot be exploited or developed for use in a malicious manner, such as within an Information Waifare (IW) scenario, where systems may be attacked autonomously by agent system implem-entations. This paper will discuss tne cilrrenlStcite Ofmalicious use of lA's as well as focusing on attack techniques, the difficulties brought about by such attacks as well as security methods, both proactive and reactive, that could be instated within compromised or sensitive systems.
Language eng
Field of Research 080610 Information Systems Organisation
HERDC Research category C1 Refereed article in a scholarly journal
Persistent URL

Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 833 Abstract Views, 0 File Downloads  -  Detailed Statistics
Created: Mon, 07 Jul 2008, 07:34:38 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact