An Optimized Authentication Mechanism for Mobile Agents by Using Machine Learning Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.5815/ijcnis.2023.06.03
A mobile agent is a small piece of software which works on direction of its source platform on a regular basis. Because mobile agents roam around wide area networks autonomously, the protection of the agents and platforms is a serious worry. The number of mobile agents-based software applications has increased dramatically over the past year. It has also enhanced the security risks associated with such applications. Most of the security mechanisms in the mobile agent architecture focus solely on platform security, leaving mobile agent safety to be a significant challenge. An efficient authentication scheme is proposed in this article to address the situation of protection and authentication of mobile agent at the hour of migration of across multiple platforms in malicious environment. An authentication mechanism for the mobile agent based on the Hopfield neural network proposed. The mobile agent’s identity and password are authenticate using the specified mechanism at the moment of execution of assigned operation. An evaluative assessment has been offered, along with their complex character, in comparison to numerous agent authentication approaches. The proposed method has been put into practice, and its different aspects have been put to the test. In contrasted to typical client-server and code-on-demand approaches, the analysis shows that computation here is often more safe and simpler.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.5815/ijcnis.2023.06.03
- https://www.mecs-press.org/ijcnis/ijcnis-v15-n6/IJCNIS-V15-N6-3.pdf
- OA Status
- diamond
- Cited By
- 2
- References
- 25
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4389257012
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4389257012Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.5815/ijcnis.2023.06.03Digital Object Identifier
- Title
-
An Optimized Authentication Mechanism for Mobile Agents by Using Machine LearningWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-12-01Full publication date if available
- Authors
-
Pradeep Kumar, Niraj Singhal, Mohammad Asim, Avimanyou VatsaList of authors in order
- Landing page
-
https://doi.org/10.5815/ijcnis.2023.06.03Publisher landing page
- PDF URL
-
https://www.mecs-press.org/ijcnis/ijcnis-v15-n6/IJCNIS-V15-N6-3.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://www.mecs-press.org/ijcnis/ijcnis-v15-n6/IJCNIS-V15-N6-3.pdfDirect OA link when available
- Concepts
-
Computer science, Authentication (law), Mobile agent, Password, Computer security, Authentication server, Multi-factor authentication, Computer network, Authentication protocol, Distributed computingTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
2Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 1, 2024: 1Per-year citation counts (last 5 years)
- References (count)
-
25Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4389257012 |
|---|---|
| doi | https://doi.org/10.5815/ijcnis.2023.06.03 |
| ids.doi | https://doi.org/10.5815/ijcnis.2023.06.03 |
| ids.openalex | https://openalex.org/W4389257012 |
| fwci | 0.87910458 |
| type | article |
| title | An Optimized Authentication Mechanism for Mobile Agents by Using Machine Learning |
| biblio.issue | 6 |
| biblio.volume | 15 |
| biblio.last_page | 39 |
| biblio.first_page | 30 |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9995999932289124 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T12203 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9991999864578247 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Mobile Agent-Based Network Management |
| topics[2].id | https://openalex.org/T11241 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9987000226974487 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1711 |
| topics[2].subfield.display_name | Signal Processing |
| topics[2].display_name | Advanced Malware Detection Techniques |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.8959105014801025 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C148417208 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6822022795677185 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q4825882 |
| concepts[1].display_name | Authentication (law) |
| concepts[2].id | https://openalex.org/C84875433 |
| concepts[2].level | 2 |
| concepts[2].score | 0.659869372844696 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q3277848 |
| concepts[2].display_name | Mobile agent |
| concepts[3].id | https://openalex.org/C109297577 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5871104001998901 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q161157 |
| concepts[3].display_name | Password |
| concepts[4].id | https://openalex.org/C38652104 |
| concepts[4].level | 1 |
| concepts[4].score | 0.5510433912277222 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[4].display_name | Computer security |
| concepts[5].id | https://openalex.org/C2777331311 |
| concepts[5].level | 3 |
| concepts[5].score | 0.4667162299156189 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q784561 |
| concepts[5].display_name | Authentication server |
| concepts[6].id | https://openalex.org/C194699767 |
| concepts[6].level | 4 |
| concepts[6].score | 0.44148606061935425 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q7878662 |
| concepts[6].display_name | Multi-factor authentication |
| concepts[7].id | https://openalex.org/C31258907 |
| concepts[7].level | 1 |
| concepts[7].score | 0.40896281599998474 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[7].display_name | Computer network |
| concepts[8].id | https://openalex.org/C21564112 |
| concepts[8].level | 3 |
| concepts[8].score | 0.3572208285331726 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q4825885 |
| concepts[8].display_name | Authentication protocol |
| concepts[9].id | https://openalex.org/C120314980 |
| concepts[9].level | 1 |
| concepts[9].score | 0.3367539644241333 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q180634 |
| concepts[9].display_name | Distributed computing |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.8959105014801025 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/authentication |
| keywords[1].score | 0.6822022795677185 |
| keywords[1].display_name | Authentication (law) |
| keywords[2].id | https://openalex.org/keywords/mobile-agent |
| keywords[2].score | 0.659869372844696 |
| keywords[2].display_name | Mobile agent |
| keywords[3].id | https://openalex.org/keywords/password |
| keywords[3].score | 0.5871104001998901 |
| keywords[3].display_name | Password |
| keywords[4].id | https://openalex.org/keywords/computer-security |
| keywords[4].score | 0.5510433912277222 |
| keywords[4].display_name | Computer security |
| keywords[5].id | https://openalex.org/keywords/authentication-server |
| keywords[5].score | 0.4667162299156189 |
| keywords[5].display_name | Authentication server |
| keywords[6].id | https://openalex.org/keywords/multi-factor-authentication |
| keywords[6].score | 0.44148606061935425 |
| keywords[6].display_name | Multi-factor authentication |
| keywords[7].id | https://openalex.org/keywords/computer-network |
| keywords[7].score | 0.40896281599998474 |
| keywords[7].display_name | Computer network |
| keywords[8].id | https://openalex.org/keywords/authentication-protocol |
| keywords[8].score | 0.3572208285331726 |
| keywords[8].display_name | Authentication protocol |
| keywords[9].id | https://openalex.org/keywords/distributed-computing |
| keywords[9].score | 0.3367539644241333 |
| keywords[9].display_name | Distributed computing |
| language | en |
| locations[0].id | doi:10.5815/ijcnis.2023.06.03 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S2501737937 |
| locations[0].source.issn | 2074-9090, 2074-9104 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2074-9090 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | International Journal of Computer Network and Information Security |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | |
| locations[0].pdf_url | https://www.mecs-press.org/ijcnis/ijcnis-v15-n6/IJCNIS-V15-N6-3.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | International Journal of Computer Network and Information Security |
| locations[0].landing_page_url | https://doi.org/10.5815/ijcnis.2023.06.03 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5100759277 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-0802-9305 |
| authorships[0].author.display_name | Pradeep Kumar |
| authorships[0].countries | IN, US |
| authorships[0].affiliations[0].raw_affiliation_string | JSS Academy of Technical Education, Noida /Department of Computer Science and Engineering, Uttar Pradesh, 201301, India |
| authorships[0].affiliations[1].raw_affiliation_string | MGM College of Engineering and Technology, Noida/ Department of computer Science and Engineering, Uttar Pradesh, 201301, India |
| authorships[0].affiliations[2].institution_ids | https://openalex.org/I32907511 |
| authorships[0].affiliations[2].raw_affiliation_string | School of Computer Sciences and Engineering, Fairleigh Dickinson University New Jersey USA |
| authorships[0].affiliations[3].institution_ids | https://openalex.org/I191247993 |
| authorships[0].affiliations[3].raw_affiliation_string | Shobhit Institute of Engineering & Technology (Deemed to-be-University), Meerut, 250110, India |
| authorships[0].institutions[0].id | https://openalex.org/I191247993 |
| authorships[0].institutions[0].ror | https://ror.org/02z2sk479 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I191247993 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Shobhit University |
| authorships[0].institutions[1].id | https://openalex.org/I32907511 |
| authorships[0].institutions[1].ror | https://ror.org/04wkzvc75 |
| authorships[0].institutions[1].type | education |
| authorships[0].institutions[1].lineage | https://openalex.org/I32907511 |
| authorships[0].institutions[1].country_code | US |
| authorships[0].institutions[1].display_name | Fairleigh Dickinson University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Pradeep Kumar |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | JSS Academy of Technical Education, Noida /Department of Computer Science and Engineering, Uttar Pradesh, 201301, India, MGM College of Engineering and Technology, Noida/ Department of computer Science and Engineering, Uttar Pradesh, 201301, India, School of Computer Sciences and Engineering, Fairleigh Dickinson University New Jersey USA, Shobhit Institute of Engineering & Technology (Deemed to-be-University), Meerut, 250110, India |
| authorships[1].author.id | https://openalex.org/A5008467717 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-2614-4788 |
| authorships[1].author.display_name | Niraj Singhal |
| authorships[1].countries | IN, US |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I32907511 |
| authorships[1].affiliations[0].raw_affiliation_string | School of Computer Sciences and Engineering, Fairleigh Dickinson University New Jersey USA |
| authorships[1].affiliations[1].raw_affiliation_string | JSS Academy of Technical Education, Noida /Department of Computer Science and Engineering, Uttar Pradesh, 201301, India |
| authorships[1].affiliations[2].institution_ids | https://openalex.org/I191247993 |
| authorships[1].affiliations[2].raw_affiliation_string | Shobhit Institute of Engineering & Technology (Deemed to-be-University), Meerut, 250110, India |
| authorships[1].affiliations[3].raw_affiliation_string | MGM College of Engineering and Technology, Noida/ Department of computer Science and Engineering, Uttar Pradesh, 201301, India |
| authorships[1].institutions[0].id | https://openalex.org/I191247993 |
| authorships[1].institutions[0].ror | https://ror.org/02z2sk479 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I191247993 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Shobhit University |
| authorships[1].institutions[1].id | https://openalex.org/I32907511 |
| authorships[1].institutions[1].ror | https://ror.org/04wkzvc75 |
| authorships[1].institutions[1].type | education |
| authorships[1].institutions[1].lineage | https://openalex.org/I32907511 |
| authorships[1].institutions[1].country_code | US |
| authorships[1].institutions[1].display_name | Fairleigh Dickinson University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Niraj Singhal |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | JSS Academy of Technical Education, Noida /Department of Computer Science and Engineering, Uttar Pradesh, 201301, India, MGM College of Engineering and Technology, Noida/ Department of computer Science and Engineering, Uttar Pradesh, 201301, India, School of Computer Sciences and Engineering, Fairleigh Dickinson University New Jersey USA, Shobhit Institute of Engineering & Technology (Deemed to-be-University), Meerut, 250110, India |
| authorships[2].author.id | https://openalex.org/A5077355211 |
| authorships[2].author.orcid | https://orcid.org/0000-0003-2447-449X |
| authorships[2].author.display_name | Mohammad Asim |
| authorships[2].countries | IN, US |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I32907511 |
| authorships[2].affiliations[0].raw_affiliation_string | School of Computer Sciences and Engineering, Fairleigh Dickinson University New Jersey USA |
| authorships[2].affiliations[1].raw_affiliation_string | JSS Academy of Technical Education, Noida /Department of Computer Science and Engineering, Uttar Pradesh, 201301, India |
| authorships[2].affiliations[2].raw_affiliation_string | MGM College of Engineering and Technology, Noida/ Department of computer Science and Engineering, Uttar Pradesh, 201301, India |
| authorships[2].affiliations[3].institution_ids | https://openalex.org/I191247993 |
| authorships[2].affiliations[3].raw_affiliation_string | Shobhit Institute of Engineering & Technology (Deemed to-be-University), Meerut, 250110, India |
| authorships[2].institutions[0].id | https://openalex.org/I191247993 |
| authorships[2].institutions[0].ror | https://ror.org/02z2sk479 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I191247993 |
| authorships[2].institutions[0].country_code | IN |
| authorships[2].institutions[0].display_name | Shobhit University |
| authorships[2].institutions[1].id | https://openalex.org/I32907511 |
| authorships[2].institutions[1].ror | https://ror.org/04wkzvc75 |
| authorships[2].institutions[1].type | education |
| authorships[2].institutions[1].lineage | https://openalex.org/I32907511 |
| authorships[2].institutions[1].country_code | US |
| authorships[2].institutions[1].display_name | Fairleigh Dickinson University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Mohammad Asim |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | JSS Academy of Technical Education, Noida /Department of Computer Science and Engineering, Uttar Pradesh, 201301, India, MGM College of Engineering and Technology, Noida/ Department of computer Science and Engineering, Uttar Pradesh, 201301, India, School of Computer Sciences and Engineering, Fairleigh Dickinson University New Jersey USA, Shobhit Institute of Engineering & Technology (Deemed to-be-University), Meerut, 250110, India |
| authorships[3].author.id | https://openalex.org/A5091644250 |
| authorships[3].author.orcid | https://orcid.org/0000-0001-6694-7967 |
| authorships[3].author.display_name | Avimanyou Vatsa |
| authorships[3].countries | IN, US |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I191247993 |
| authorships[3].affiliations[0].raw_affiliation_string | Shobhit Institute of Engineering & Technology (Deemed to-be-University), Meerut, 250110, India |
| authorships[3].affiliations[1].institution_ids | https://openalex.org/I32907511 |
| authorships[3].affiliations[1].raw_affiliation_string | School of Computer Sciences and Engineering, Fairleigh Dickinson University New Jersey USA |
| authorships[3].affiliations[2].raw_affiliation_string | MGM College of Engineering and Technology, Noida/ Department of computer Science and Engineering, Uttar Pradesh, 201301, India |
| authorships[3].affiliations[3].raw_affiliation_string | JSS Academy of Technical Education, Noida /Department of Computer Science and Engineering, Uttar Pradesh, 201301, India |
| authorships[3].institutions[0].id | https://openalex.org/I191247993 |
| authorships[3].institutions[0].ror | https://ror.org/02z2sk479 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I191247993 |
| authorships[3].institutions[0].country_code | IN |
| authorships[3].institutions[0].display_name | Shobhit University |
| authorships[3].institutions[1].id | https://openalex.org/I32907511 |
| authorships[3].institutions[1].ror | https://ror.org/04wkzvc75 |
| authorships[3].institutions[1].type | education |
| authorships[3].institutions[1].lineage | https://openalex.org/I32907511 |
| authorships[3].institutions[1].country_code | US |
| authorships[3].institutions[1].display_name | Fairleigh Dickinson University |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Avimanyou Vatsa |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | JSS Academy of Technical Education, Noida /Department of Computer Science and Engineering, Uttar Pradesh, 201301, India, MGM College of Engineering and Technology, Noida/ Department of computer Science and Engineering, Uttar Pradesh, 201301, India, School of Computer Sciences and Engineering, Fairleigh Dickinson University New Jersey USA, Shobhit Institute of Engineering & Technology (Deemed to-be-University), Meerut, 250110, India |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://www.mecs-press.org/ijcnis/ijcnis-v15-n6/IJCNIS-V15-N6-3.pdf |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2023-12-02T00:00:00 |
| display_name | An Optimized Authentication Mechanism for Mobile Agents by Using Machine Learning |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9995999932289124 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W3022695109, https://openalex.org/W2161818407, https://openalex.org/W2183793056, https://openalex.org/W2129970007, https://openalex.org/W4253316174, https://openalex.org/W2390304521, https://openalex.org/W2055255535, https://openalex.org/W3002467434, https://openalex.org/W4386450650, https://openalex.org/W2029011328 |
| cited_by_count | 2 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.5815/ijcnis.2023.06.03 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S2501737937 |
| best_oa_location.source.issn | 2074-9090, 2074-9104 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2074-9090 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | International Journal of Computer Network and Information Security |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://www.mecs-press.org/ijcnis/ijcnis-v15-n6/IJCNIS-V15-N6-3.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | International Journal of Computer Network and Information Security |
| best_oa_location.landing_page_url | https://doi.org/10.5815/ijcnis.2023.06.03 |
| primary_location.id | doi:10.5815/ijcnis.2023.06.03 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S2501737937 |
| primary_location.source.issn | 2074-9090, 2074-9104 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2074-9090 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | International Journal of Computer Network and Information Security |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | |
| primary_location.pdf_url | https://www.mecs-press.org/ijcnis/ijcnis-v15-n6/IJCNIS-V15-N6-3.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | International Journal of Computer Network and Information Security |
| primary_location.landing_page_url | https://doi.org/10.5815/ijcnis.2023.06.03 |
| publication_date | 2023-12-01 |
| publication_year | 2023 |
| referenced_works | https://openalex.org/W2760528863, https://openalex.org/W2399637780, https://openalex.org/W4229077764, https://openalex.org/W2912739452, https://openalex.org/W6602118407, https://openalex.org/W3166200656, https://openalex.org/W3016531978, https://openalex.org/W4320803982, https://openalex.org/W2044839138, https://openalex.org/W2050482548, https://openalex.org/W3025957659, https://openalex.org/W3121032462, https://openalex.org/W2326237224, https://openalex.org/W2922323510, https://openalex.org/W2011426551, https://openalex.org/W4246308772, https://openalex.org/W2800109595, https://openalex.org/W2166439026, https://openalex.org/W4253177842, https://openalex.org/W2796577543, https://openalex.org/W2998215210, https://openalex.org/W2931967380, https://openalex.org/W3006276579, https://openalex.org/W50542560, https://openalex.org/W4206269579 |
| referenced_works_count | 25 |
| abstract_inverted_index.A | 0 |
| abstract_inverted_index.a | 4, 18, 38, 87 |
| abstract_inverted_index.An | 90, 122, 156 |
| abstract_inverted_index.In | 192 |
| abstract_inverted_index.It | 55 |
| abstract_inverted_index.at | 110, 148 |
| abstract_inverted_index.be | 86 |
| abstract_inverted_index.in | 71, 96, 119, 167 |
| abstract_inverted_index.is | 3, 37, 94, 206 |
| abstract_inverted_index.of | 7, 13, 32, 43, 67, 103, 107, 113, 115, 151, 153 |
| abstract_inverted_index.on | 11, 17, 78, 130 |
| abstract_inverted_index.to | 85, 99, 169, 189, 194 |
| abstract_inverted_index.The | 41, 136, 174 |
| abstract_inverted_index.and | 35, 105, 140, 182, 197, 210 |
| abstract_inverted_index.are | 142 |
| abstract_inverted_index.for | 125 |
| abstract_inverted_index.has | 48, 56, 159, 177 |
| abstract_inverted_index.its | 14, 183 |
| abstract_inverted_index.put | 179, 188 |
| abstract_inverted_index.the | 30, 33, 52, 59, 68, 72, 101, 111, 126, 131, 145, 149, 190, 200 |
| abstract_inverted_index.Most | 66 |
| abstract_inverted_index.also | 57 |
| abstract_inverted_index.area | 27 |
| abstract_inverted_index.been | 160, 178, 187 |
| abstract_inverted_index.have | 186 |
| abstract_inverted_index.here | 205 |
| abstract_inverted_index.hour | 112 |
| abstract_inverted_index.into | 180 |
| abstract_inverted_index.more | 208 |
| abstract_inverted_index.over | 51 |
| abstract_inverted_index.past | 53 |
| abstract_inverted_index.roam | 24 |
| abstract_inverted_index.safe | 209 |
| abstract_inverted_index.such | 64 |
| abstract_inverted_index.that | 203 |
| abstract_inverted_index.this | 97 |
| abstract_inverted_index.wide | 26 |
| abstract_inverted_index.with | 63, 163 |
| abstract_inverted_index.agent | 2, 74, 83, 109, 128, 171 |
| abstract_inverted_index.along | 162 |
| abstract_inverted_index.based | 129 |
| abstract_inverted_index.focus | 76 |
| abstract_inverted_index.often | 207 |
| abstract_inverted_index.piece | 6 |
| abstract_inverted_index.risks | 61 |
| abstract_inverted_index.shows | 202 |
| abstract_inverted_index.small | 5 |
| abstract_inverted_index.test. | 191 |
| abstract_inverted_index.their | 164 |
| abstract_inverted_index.using | 144 |
| abstract_inverted_index.which | 9 |
| abstract_inverted_index.works | 10 |
| abstract_inverted_index.year. | 54 |
| abstract_inverted_index.across | 116 |
| abstract_inverted_index.agents | 23, 34 |
| abstract_inverted_index.around | 25 |
| abstract_inverted_index.basis. | 20 |
| abstract_inverted_index.method | 176 |
| abstract_inverted_index.mobile | 1, 22, 44, 73, 82, 108, 127, 137 |
| abstract_inverted_index.moment | 150 |
| abstract_inverted_index.neural | 133 |
| abstract_inverted_index.number | 42 |
| abstract_inverted_index.safety | 84 |
| abstract_inverted_index.scheme | 93 |
| abstract_inverted_index.solely | 77 |
| abstract_inverted_index.source | 15 |
| abstract_inverted_index.worry. | 40 |
| abstract_inverted_index.Because | 21 |
| abstract_inverted_index.address | 100 |
| abstract_inverted_index.article | 98 |
| abstract_inverted_index.aspects | 185 |
| abstract_inverted_index.complex | 165 |
| abstract_inverted_index.leaving | 81 |
| abstract_inverted_index.network | 134 |
| abstract_inverted_index.regular | 19 |
| abstract_inverted_index.serious | 39 |
| abstract_inverted_index.typical | 195 |
| abstract_inverted_index.Hopfield | 132 |
| abstract_inverted_index.analysis | 201 |
| abstract_inverted_index.assigned | 154 |
| abstract_inverted_index.enhanced | 58 |
| abstract_inverted_index.identity | 139 |
| abstract_inverted_index.multiple | 117 |
| abstract_inverted_index.networks | 28 |
| abstract_inverted_index.numerous | 170 |
| abstract_inverted_index.offered, | 161 |
| abstract_inverted_index.password | 141 |
| abstract_inverted_index.platform | 16, 79 |
| abstract_inverted_index.proposed | 95, 175 |
| abstract_inverted_index.security | 60, 69 |
| abstract_inverted_index.simpler. | 211 |
| abstract_inverted_index.software | 8, 46 |
| abstract_inverted_index.agent’s | 138 |
| abstract_inverted_index.different | 184 |
| abstract_inverted_index.direction | 12 |
| abstract_inverted_index.efficient | 91 |
| abstract_inverted_index.execution | 152 |
| abstract_inverted_index.increased | 49 |
| abstract_inverted_index.malicious | 120 |
| abstract_inverted_index.mechanism | 124, 147 |
| abstract_inverted_index.migration | 114 |
| abstract_inverted_index.platforms | 36, 118 |
| abstract_inverted_index.practice, | 181 |
| abstract_inverted_index.proposed. | 135 |
| abstract_inverted_index.security, | 80 |
| abstract_inverted_index.situation | 102 |
| abstract_inverted_index.specified | 146 |
| abstract_inverted_index.assessment | 158 |
| abstract_inverted_index.associated | 62 |
| abstract_inverted_index.challenge. | 89 |
| abstract_inverted_index.character, | 166 |
| abstract_inverted_index.comparison | 168 |
| abstract_inverted_index.contrasted | 193 |
| abstract_inverted_index.evaluative | 157 |
| abstract_inverted_index.mechanisms | 70 |
| abstract_inverted_index.operation. | 155 |
| abstract_inverted_index.protection | 31, 104 |
| abstract_inverted_index.approaches, | 199 |
| abstract_inverted_index.approaches. | 173 |
| abstract_inverted_index.computation | 204 |
| abstract_inverted_index.significant | 88 |
| abstract_inverted_index.agents-based | 45 |
| abstract_inverted_index.applications | 47 |
| abstract_inverted_index.architecture | 75 |
| abstract_inverted_index.authenticate | 143 |
| abstract_inverted_index.dramatically | 50 |
| abstract_inverted_index.environment. | 121 |
| abstract_inverted_index.applications. | 65 |
| abstract_inverted_index.autonomously, | 29 |
| abstract_inverted_index.client-server | 196 |
| abstract_inverted_index.authentication | 92, 106, 123, 172 |
| abstract_inverted_index.code-on-demand | 198 |
| cited_by_percentile_year.max | 95 |
| cited_by_percentile_year.min | 90 |
| countries_distinct_count | 2 |
| institutions_distinct_count | 4 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.44999998807907104 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.66353566 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |