Sciweavers

1612 search results - page 222 / 323
» About models of security protocols
Sort
View
ESORICS
2009
Springer
15 years 10 months ago
Automatically Generating Models for Botnet Detection
A botnet is a network of compromised hosts that is under the control of a single, malicious entity, often called the botmaster. We present a system that aims to detect bots, indepe...
Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan G...
ESORICS
2008
Springer
14 years 11 months ago
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms
The rapid expansion of Internet based services has created opportunities for ICT firms to collect and use, in an unauthorized way, information about individuals (e.g. customers, pa...
Athanassios N. Yannacopoulos, Costas Lambrinoudaki...
ECOI
2008
84views more  ECOI 2008»
14 years 10 months ago
Towards a structured approach to building qualitative reasoning models and simulations
Successful transfer and uptake of qualitative reasoning technology for modelling and simulation in a variety of domains has been hampered by the lack of a structured methodology t...
Bert Bredeweg, Paulo Salles, Anders Bouwer, Jochem...
ICCCN
2008
IEEE
15 years 4 months ago
Sources and Monitors: A Trust Model for Peer-to-Peer Networks
—In this paper, we introduce an objective model of trust in peer-to-peer networks. Based on this model, we develop protocols that can be used by the peers in a peer-to-peer netwo...
Yan Li, Mohamed G. Gouda
IPPS
2010
IEEE
14 years 8 months ago
Stability of a localized and greedy routing algorithm
Abstract--In this work, we study the problem of routing packets between undifferentiated sources and sinks in a network modeled by a multigraph. We consider a distributed and local...
Christelle Caillouet, Florian Huc, Nicolas Nisse, ...