{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:18:11Z","timestamp":1726064291473},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030222765"},{"type":"electronic","value":"9783030222772"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_32","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:02:28Z","timestamp":1577793748000},"page":"807-823","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Trees, Cryptosignatures, and Cyberspace Mobile Agent Interfaces"],"prefix":"10.1007","author":[{"given":"C. F.","family":"Nourani","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"key":"32_CR1","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1177\/1548512917738858","volume":"15","author":"B Thompson","year":"2018","unstructured":"Thompson, B., & King, J. M. (2018). An agent-based modeling framework for cybersecurity in mobile tactical networks - cybersecurity in mobile tactical networks. The Journal of Defense Modeling and Simulation, 15, 205\u2013218.","journal-title":"The Journal of Defense Modeling and Simulation"},{"unstructured":"NATO. (2017). Intelligent autonomous agents for cyber defence and resilience organized by the North Atlantic Treaty Organization (NATO) research group IST-152-RTG. Prague, Czech Republic, on 18\u201320 October 2017.","key":"32_CR2"},{"key":"32_CR3","volume-title":"Logical foundations of artificial intelligence","author":"MR Genesereth","year":"1987","unstructured":"Genesereth, M. R., & Nilsson, N. J. (1987). Logical foundations of artificial intelligence. Burlington, MA: Morgan-Kaufmann."},{"unstructured":"Nourani, C. F. (1997). Intelligent Tree Computing, Decision Trees and Soft OOP Tree Computing September 2, 1997 Frontiers in Soft Computing and Decision Systems Papers from the 1997 Fall Symposium, Boston Technical Report FS-97-04 AAAI. \nwww.aaai.org\/Press\/Reports\/Symposia\/Fall\/fs-97-04.html","key":"32_CR4"},{"issue":"4","key":"32_CR5","doi-asserted-by":"publisher","first-page":"207","DOI":"10.3233\/AIC-1996-9402","volume":"4","author":"CF Nourani","year":"1994","unstructured":"Nourani, C. F. (1994). Slalom tree computing - A computing theory for artificial intelligence. AI Communications, 4(4), 207\u2013213. Revised December 1995, December 1996.","journal-title":"AI Communications"},{"doi-asserted-by":"crossref","unstructured":"Thatcher, J. W., Wagner, E. G., & Wright, J. B. (1978). Data type specification: Parameterization and the power of specification techniques. In Proc. 10th Annual Symposium on Theory of Computing (STOC), San Diego, CA (pp. 119\u2013132). New York, NY: ACM.","key":"32_CR6","DOI":"10.1145\/800133.804340"},{"key":"32_CR7","volume-title":"A formal approach to agent planning with inference trees","author":"CF Nourani","year":"2015","unstructured":"Nourani, C. F., & F\u00e4hndrich, J. (2015, August). A formal approach to agent planning with inference trees. Trieste: NAEC."},{"unstructured":"Nourani, C. F. (1991). Planning and plausible reasoning in AI. In Proc. Scandinavian Conference in AI, May 1991, Denmark (pp. 150\u2013157). IOS Press.","key":"32_CR8"},{"key":"32_CR9","volume-title":"Free proof trees, model-theoretic planning and nondeterministic algebraic plan computation with G-diagrams","author":"CF Nourani","year":"1995","unstructured":"Nourani, C. F. (1995). Free proof trees, model-theoretic planning and nondeterministic algebraic plan computation with G-diagrams. Sheffield, UK: AISB."},{"unstructured":"Goguen, J. A., Thatcher, J. W., Wagner, E. G., & Wright, J. B. (1973). A junction between computer science and category theory (Parts I and II) (N.Y. research report, RC4526). Yorktown Heights, NY: IBM T. J. Watson Research Center.","key":"32_CR10"},{"unstructured":"Nourani, C. F. (2004). Intelligent tree computing, cryptosignatures and cyberspace interfaces (ICAI-02). Monte Carlo Resort, Las Vegas, NV: CSREA Press.","key":"32_CR11"},{"unstructured":"Nourani, C. F. (2017). A new cryptosignature block chain protocol algorithm (Technical report on research gate).","key":"32_CR12"},{"unstructured":"Nourani, C. F. (1996). Cyberdocking. A business plan on a venture sent Microsoft.","key":"32_CR13"},{"unstructured":"Nourani, C. F. (1997). Intelligent languages. A preliminary syntactic theory. In A. Kelemenov\u00e1 (Eds.) Proceedings of the Mathematical Foundations CS\u201998 Satellite Workshop on Grammar Systems. Silesian University, Faculty of Philosophy and Sciences.","key":"32_CR14"},{"unstructured":"Nourani, C. F. (1999). Agent computing, KB for intelligent forecasting, and model discovery for knowledge management, June 1998. In AAAI Workshop on Agent Based Systems in the Business Context Orlando, Florida, July 1999 (AAAI Press technical report WS-99-01).","key":"32_CR15"},{"unstructured":"Nourani, C. F. (1997). Modelling, validation, and hybrid design of intelligent systems February 5, 1997 KMEL98, Karlsruhe, Germany, January 1998. In 8th Workshop Knowledge Engineering Methods and Languages. Institut fur Angewandte Informatik und formal Beschreibungsverfhrn, Karlsruhe University, Germany, January 1998.","key":"32_CR16"},{"issue":"1","key":"32_CR17","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1142\/S0218843097000069","volume":"6","author":"FMT Brazier","year":"1997","unstructured":"Brazier, F. M. T., Dunin-Keplicz, B. M., Jennings, N. R., & Treur, J. (1997). DESIRE: Modeling multi-agent systems in a compositional formal framework. International Journal of Cooperative Information Systems, 6(1), 67\u201394.","journal-title":"International Journal of Cooperative Information Systems"},{"unstructured":"Nourani, C. F. (2003). A sound and complete agent logic paradigm, 2000. In Parts and Abstract Published at ASL, and FSS, AAAI Symposium 2003.","key":"32_CR18"},{"key":"32_CR19","first-page":"141","volume-title":"Lecture notes in computer science","author":"FMT Brazier","year":"1997","unstructured":"Brazier, F. M. T., Jonker, C. M., & Treur, J. (1997). Formalization of a cooperation model based on joint intentions. In Lecture notes in computer science (Vol. 1193, pp. 141\u2013155). Berlin: Springer."},{"key":"32_CR20","volume-title":"Multiagent decision trees, competitive models, and goal satisfiability","author":"CF Nourani","year":"2013","unstructured":"Nourani, C. F., & Schulte, O. (2013). Multiagent decision trees, competitive models, and goal satisfiability. Ostrava, Czech Republic: DICTAP."},{"doi-asserted-by":"crossref","unstructured":"ACM. (1998). The mobile object papers, ACM October 98 (vol 41, no. 10).","key":"32_CR21","DOI":"10.1145\/278476.278494"},{"unstructured":"Nourani, C. F. (1992). A multi-agent AI approach to fault free and fault tolerant AI, FLAIRS-93. In D. D. Dankell II, (Eds.) Proc. Florida AI Symposium, April 18 1993, Florida. Florida Artificial Intelligence Research Symposium. St. Petersburg, FL: Florida Research Society.","key":"32_CR22"},{"unstructured":"Nilsson, N. J. (1969). Searching, problem solving, and game-playing trees for minimal cost solutions. In A. J. Morell (Ed.) IFIP 1968, Amsterdam, North-Holland (Vol 2, pp. 1556-1562).","key":"32_CR23"},{"unstructured":"Gale, D., & Stewart, F. M. Infinite games with perfect information. In: Contributions to the theory of games, annals of mathematical studies, vol. 28, Princeton.","key":"32_CR24"},{"unstructured":"Nourani, C. F. (1998). Intelligent trees, thought models, and intelligent discovery: Model based reasoning in scientific discovery (MBR\u201998), Pavia, Italy, December 17\u201319, 1998.","key":"32_CR25"},{"doi-asserted-by":"crossref","unstructured":"Cardenas, A., & Crispo, B. (2016). Cyber-physical security and privacy. In: IEEE internet computing, vol. 20, no. 5. Intelligent Cybersecurity Agents [Guest editors' introduction] - IEEE Journals & Magazine. \nhttps:\/\/ieeexplore.ieee.org\/document\/75793973\/7","key":"32_CR26","DOI":"10.1109\/MIC.2016.107"}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:07:31Z","timestamp":1577794051000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_32","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}