Sciweavers

50 search results - page 3 / 10
» Bringing knowledge to network defense
Sort
View
WSC
1997
13 years 7 months ago
Using Compensating Reconfiguration to Maintain Military Distributed Simulations
In Department of Defense (DoD) distributed training simulations, events occur that can cause unrealistic behavior. These events can be system events, such as the loss of a hostor ...
Donald J. Welch, James M. Purtilo
RAID
2005
Springer
13 years 11 months ago
Empirical Analysis of Rate Limiting Mechanisms
One class of worm defense techniques that received attention of late is to “rate limit” outbound traffic to contain fast spreading worms. Several proposals of rate limiting t...
Cynthia Wong, Stan Bielski, Ahren Studer, Chenxi W...
HICSS
2008
IEEE
151views Biometrics» more  HICSS 2008»
14 years 6 days ago
A Conceptual Framework of Transactive Networks System
A virtual organization is a temporary network of companies, which implies the potential opportunity to learn and share abundant sources of complementary and compatible knowledge p...
Sheng-cheng Lin, Yu-Min Wang, Daniel Y. Shee
IJET
2008
197views more  IJET 2008»
13 years 5 months ago
TENTube: A Video-based Connection Tool Supporting Competence Development
The vast majority of knowledge management initiatives fail because they do not take sufficiently into account the emotional, psychological and social needs of individuals. Only if ...
Albert A. Angehrn, Katrina Diane Maxwell
GLOBECOM
2010
IEEE
13 years 3 months ago
Identifying Insider-Based Jammers in Multi-Channel Wireless Networks
Abstract-- We consider the problem of identifying insiderbased attacks in the form of jammers in multi-channel wireless networks, where jammers have the inside knowledge of frequen...
Hoang Nguyen, Thadpong Pongthawornkamol, Klara Nah...