skip to main content
10.1145/3227609.3227684acmotherconferencesArticle/Chapter ViewAbstractPublication PageswimsConference Proceedingsconference-collections
research-article

Intelligent E-Service for Detecting Malicious Code Based Agent Technology

Published:25 June 2018Publication History

ABSTRACT

Implementation of new ICT technologies aims at improving government services all over the world. The main agent technology in ICT technology based artificial intelligence in the proposed e-service is that it recognizes a cyber-attack after the state has completed the e-form on the website approved by any citizen and sends out the obtained results of the computer scan. Intelligent e-service decides whether to post the threat to a computer emergency response team of the Ministry of Interior or reject it after the final danger parameters have been obtained. This 1paper presents possible support decision system in the process that detects malicious code.

References

  1. Pivk, Aleksander, and Matjaž Gams. 2000. Intelligent Agents in E-commerce. Electrotechnical Review, 67(5), 251--260.Google ScholarGoogle Scholar
  2. Barbara Hayes-Roth. 1995. An architecture for adaptive intelligent systems. Artif. Intell. 72, 1 -2 (January 1995), 329--365. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Lu, Jie, Da Ruan, and Guangquan Zhang. 2007. E-Service Intelligence. Springer-Verlag Berlin Heidelberg.Google ScholarGoogle Scholar
  4. Rizmal, Irina., Radunović, Vladimir. and Krivokapić, Dorđe. 2016. Guide through information security in the Republic of Serbia, Organization for Security and Co-operation in Europe, (5 October 20016). Retrieved February 3, 2018 from https://www.osce.org/serbia/272171Google ScholarGoogle Scholar
  5. Law on Information Security. Official Gazette of RS, issue no. 6/16. Retrieved from http://www.parlament.gov.rsGoogle ScholarGoogle Scholar
  6. Virustotal. 2018. Free online virus, malware and url scanner. Retrieved from http://virustotal.com.Google ScholarGoogle Scholar
  7. Liu, Shuhua Monica, and Qianli Yuan. 2015. Special Issue Article: The evolution of information and communication technology in public administration. Public Administration and Development, 35(2), 140--151.Google ScholarGoogle ScholarCross RefCross Ref
  8. Lolić, Teodora, Dušnaka Dakić, Ivan Miković, and Darko Stefanović. 2017. Electronic government at the local level in the Republic of Serbia. In Proceeding of the 10th International Scientific Conference "Science and Higher Education in Function of Sustainable Development" (SED'17). BTC, Mećavnik-Drvengrad, Užice, Serbia, 35--40.Google ScholarGoogle Scholar
  9. Ian M. Chapman, Sylvain P. Leblanc, and Andrew Partington. 2011. Taxonomy of cyber attacks and simulation of their effects. In Proceedings of the 2011 Military Modeling & Simulation Symposium (MMS '11). Society for Computer Simulation International, San Diego, CA, USA, 73--80. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Andreas Schuster. 2008. The impact of Microsoft Windows pool allocation strategies on memory forensics. Digit. Investig. 5 (September 2008), S58-S64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Ross, Timothy J. 2009. Fuzzy logic with engineering applications. John Wiley & Sons. NY.Google ScholarGoogle Scholar
  12. Casillas, Jorge, Oscar Cordón, Francisco Herrera, and Luis Magdalena. 2003. Accuracy Improvements to Find the Balance Interpretability-Accuracy in Linguistic Fuzzy Modeling: An Overview. In Accuracy Improvements in Linguistic Fuzzy Modeling, Casillas, Jorge, Oscar Cordón, Francisco Herrera, and Luis Magdalena (Eds). Studies in Fuzziness and Soft Computing, Vol 129. Springer, Berlin, Heidelberg, 3--24.Google ScholarGoogle Scholar
  13. Pasquale De Meo, Giovanni Quattrone, and Domenico Ursino. 2008. A decision support system for designing new services tailored to citizen profiles in a complex and distributed e-government scenario. Data Knowl. Eng. 67, 1 (October 2008), 161--184. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Phyu, Thu Zar, and Nyein Nyein Oo. 2016. Performance Comparison of Feature Selection Methods. In MATEC Web of Conferences, Vol. 42. EDP Sciences, 06002-p.2- 06002-p.4.Google ScholarGoogle Scholar
  15. Chandrashekar, Girish, and Ferat Sahin. 2014. A survey on feature selection methods. Computers & Electrical Engineering. 40(1). 16--28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Zdravko Markov and Ingrid Russell. 2006. An introduction to the WEKA data mining system. SIGCSE Bull. 38, 3 (June 2006), 367--368. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Rakesh Agrawal, Tomasz Imieliński, and Arun Swami. 1993. Mining association rules between sets of items in large databases. SIGMOD Rec. 22, 2 (June 1993), 207--216. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Intelligent E-Service for Detecting Malicious Code Based Agent Technology

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader