Main Article Content
Bijani, S., & Robertson, D. (2014). A review of attacks and security approaches in open multi-agent systems. Artificial Intel-ligence Review, 42(4), 607-636. https://doi.org/10.1007/s10462-012-9343-1
Borselius, N. (2002, June). Security in multi-agent systems. In Proceedings of the 2002 International Conference on Security and Management (SAM'02) (pp. 31-36).
Bouch, A. (2011). 3-D Secure: A critical review of 3-D Secure and its effectiveness in preventing card not present fraud. University of London, Londra, eri?im: http://www. 58bits. com/thesis/3-D_Secure. pdf, eri?im tarihi, 8, 2014.
Cremonini, M., Omicini, A., & Zambonelli, F. (1999). Multi-agent systems on the Internet: Extending the scope of coordina-tion towards security and topology. InMulti-Agent System Engineering (pp. 77-88). Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-48437-X_7
Jung, Y., Kim, M., Masoumzadeh, A., & Joshi, J. B. (2012). A survey of security issue in multi-agent systems. Artificial Intelli-gence Review, 37(3), 239-260. https://doi.org/10.1007/s10462-011-9228-8
Lokhande, P. S. (2013). E-Commerce Applications: Vulnerabilities, Attacks and Countermeasures.
Mouratidis, H., Giorgini, P., & Manson, G. (2003, July). Modelling secure multiagent systems. In Proceedings of the second in-ternational joint conference on Autonomous agents and multiagent systems (pp. 859-866). ACM. https://doi.org/10.1145/860575.860713
Niranjanamurthy, M., & Chahar, D. D. (2013). The study of e-commerce security issues and solutions. International Journal of Advanced Research in Computer and Communication Engineering, 2(7), 2885-2895.
Stallings, W., & Brown, L. (2008). Computer security. Principles and Practice.
Viega, J., Bloch, J. T., & Chandra, P. (2001). Applying aspect-oriented programming to security. Cutter IT Journal, 14(2), 31-39.
Wong, H. C., & Sycara, K. (2000). Adding security and trust to multiagent systems. Applied Artificial Intelligence, 14(9), 927-941. https://doi.org/10.1080/08839510050144886