Sciweavers

Share
19 search results - page 1 / 4
» The Derivation and Use of a Scalable Model for Network Attac...
Sort
View
JNW
2008
118views more  JNW 2008»
10 years 2 months ago
The Derivation and Use of a Scalable Model for Network Attack Identification and Path Prediction
The rapid growth of the Internet has triggered an explosion in the number of applications that leverage its capabilities. Unfortunately, many are designed to burden o infrastructur...
Sanjeeb Nanda, Narsingh Deo
IEEEARES
2009
IEEE
10 years 11 months ago
A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation
Abstract—Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through se...
Virginia N. L. Franqueira, Pascal van Eck, Roel Wi...
RTAS
2005
IEEE
10 years 9 months ago
Scalable QoS-Based Resource Allocation in Hierarchical Networked Environment
In this paper, we study the problem of allocating end-toend bandwidth to each of multiple traffic flows in a largescale network. We adopt the QoS-based Resource Allocation Model...
Sourav Ghosh, Ragunathan Rajkumar, Jeffery P. Hans...
BMCBI
2008
107views more  BMCBI 2008»
10 years 4 months ago
A machine learning approach to explore the spectra intensity pattern of peptides using tandem mass spectrometry data
Background: A better understanding of the mechanisms involved in gas-phase fragmentation of peptides is essential for the development of more reliable algorithms for high-throughp...
Cong Zhou, Lucas D. Bowler, Jianfeng Feng
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
10 years 9 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
books