Sciweavers

69 search results - page 7 / 14
» A Fuzzy Model for IT Security Investments
Sort
View
EOR
2007
151views more  EOR 2007»
14 years 9 months ago
A possibilistic decision model for new product supply chain design
This paper models supply chain (SC) uncertainties by fuzzy sets and develops a possibilistic SC configuration model for new products with unreliable or unavailable SC statistical...
Juite Wang, Yun-Feng Shu
SIGMETRICS
2008
ACM
119views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Network externalities and the deployment of security features and protocols in the internet
Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular ec...
Marc Lelarge, Jean Bolot
ATAL
2005
Springer
15 years 3 months ago
Fuzzy number approach to trust in coalition environment
General trust management model that we present is adapted for ad-hoc coalition environment, rather than for classic client-supplier relationship. The trust representation used in ...
Martin Rehák, Michal Pechoucek, Petr Benda
AGENTS
2001
Springer
15 years 2 months ago
A fuzzy model of reputation in multi-agent systems
Agents are intended to interact in open systems where the knowledge about others (reputation) is incomplete and uncertain. Also, this knowledge about other agents is subjective si...
Javier Carbo Rubiera, José M. Molina L&oacu...
72
Voted
FC
2009
Springer
135views Cryptology» more  FC 2009»
15 years 4 months ago
Blue versus Red: Towards a Model of Distributed Security Attacks
Abstract. This paper analyzes the threat of distributed attacks by developing a two-sided multiplayer model of security in which attackers aim to deny service and defenders strateg...
Neal Fultz, Jens Grossklags