Sciweavers

50 search results - page 2 / 10
» Bringing knowledge to network defense
Sort
View
CL
2000
Springer
13 years 9 months ago
Logic, Knowledge Representation, and Bayesian Decision Theory
In this paper I give a brief overview of recent work on uncertainty inAI, and relate it to logical representations. Bayesian decision theory and logic are both normative frameworks...
David Poole
CORR
2010
Springer
432views Education» more  CORR 2010»
13 years 5 months ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen
IJNSEC
2006
89views more  IJNSEC 2006»
13 years 5 months ago
Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more...
Adam J. Rocke, Ronald F. DeMara
JCIT
2007
150views more  JCIT 2007»
13 years 5 months ago
A Dynamic Knowledge Representation Model based on Hybrid Approach
Our fundamental objective is to tackle the problem faced in the field of information retrieval and classification in the current era of information overflow by proposing better an...
Reena T. N. Shetty, Pierre-Michel Riccio, Joë...
ICDCS
2011
IEEE
12 years 4 months ago
Localizing Multiple Jamming Attackers in Wireless Networks
Abstract—Jamming attacks and unintentional radio interference are one of the most urgent threats harming the dependability of wireless communication and endangering the successfu...
Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu