TY - Generic T1 - A Review of Attacks and Security Approaches in Open Multi-agent Systems Y1 - 2012 A1 - Shahriar Bijani A1 - David Robertson AB - Open multi-agent systems (MASs) have growing popularity in the Multi-agent Systems community and are predicted to have many applications in future, as large scale distributed systems become more widespread. A major practical limitation to open MASs is security because the openness of such systems negates many traditional security solutions. In this paper we introduce and classify main attacks on open MASs. We then survey and analyse various security techniques in the literature and categorise them under prevention and detection approaches. Finally, we suggest which security technique is an appropriate countermeasure for which classes of attack. ER - TY - CONF T1 - The Use of Reputation as Noise-resistant Selection Bias in a Co-evolutionary Multi-agent System T2 - Genetic and Evolutionary Computation Conference Y1 - 2012 A1 - Nikolaos Chatzinikolaou A1 - Dave Robertson JF - Genetic and Evolutionary Computation Conference CY - Philadelphia ER - TY - Generic T1 - Intrusion Detection in Open Peer-to-Peer Multi-agent Systems T2 - 5th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2011) Y1 - 2011 A1 - Shahriar Bijani A1 - David Robertson AB - One way to build large-scale autonomous systems is to develop open peer-to-peer architectures in which peers are not pre-engineered to work together and in which peers themselves determine the social norms that govern collective behaviour. A major practical limitation to such systems is security because the very openness of such systems negates most traditional security solutions. We propose a programme of research that addresses this problem by devising ways of attack detection and damage limitation that take advantage of social norms described by electronic institutions. We have analysed security issues of open peer-to-peer multi-agent systems and focused on probing attacks against confidentiality. We have proposed a framework and adapted an inference system, which shows the possibility of private information disclosure by an adversary. We shall suggest effective countermeasures in such systems and propose attack response techniques to limit possible damages. JF - 5th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2011) T3 - Managing the dynamics of networks and services PB - Springer-Verlag Berlin SN - 978-3-642-21483-7 ER - TY - Generic T1 - Probing Attacks on Multi-agent Systems using Electronic Institutions T2 - Declarative Agent Languages and Technologies Workshop (DALT), AAMAS 2011 Y1 - 2011 A1 - Shahriar Bijani A1 - David Robertson A1 - David Aspinall JF - Declarative Agent Languages and Technologies Workshop (DALT), AAMAS 2011 ER - TY - CHAP T1 - Molecular Orbital Calculations of Inorganic Compounds T2 - Inorganic Experiments Y1 - 2010 A1 - C. A. Morrison A1 - N. Robertson A1 - Turner, A. A1 - van Hemert, J. A1 - Koetsier, J. ED - J. Derek Woollins JF - Inorganic Experiments PB - Wiley-VCH SN - 978-3527292530 ER - TY - CONF T1 - Interaction as a Grounding for Peer to Peer Knowledge Sharing T2 - Advances in Web Semantics Y1 - 2007 A1 - Robertson, D. A1 - Walton, C. A1 - Barker, A. A1 - Besana, P. A1 - Chen-Burger, Y. A1 - Hassan, F. A1 - Lambert, D. A1 - Li, G. A1 - McGinnis, J A1 - Osman, N. A1 - Bundy, A. A1 - McNeill, F. A1 - van Harmelen, F. A1 - Sierra, C. A1 - Giunchiglia, F. JF - Advances in Web Semantics PB - LNCS-IFIP VL - 1 ER -