Sciweavers

405 search results - page 60 / 81
» Avatar-centric Risk Evaluation
Sort
View
IAW
2003
IEEE
15 years 3 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
85
Voted
FC
2001
Springer
123views Cryptology» more  FC 2001»
15 years 2 months ago
Trust: A Collision of Paradigms
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
L. Jean Camp, Helen Nissenbaum, Cathleen McGrath
IWCLS
1999
Springer
15 years 1 months ago
An Adaptive Agent Based Economic Model
In this paper we describe a simple model of adaptive agents of different types, represented by Learning Classifier Systems (LCS), which make investment decisions about a risk fre...
Sonia Schulenburg, Peter Ross
IUI
1993
ACM
15 years 1 months ago
The price of flexibility
The goal of this paper is to model an agent who dislikes large choice sets because of the “cost of thinking” involved in choosing from them. We take as a primitive a preferenc...
David D. Woods
DSN
2004
IEEE
15 years 1 months ago
On Failure Dependent Protection in Optical Grooming Networks
Resiliency to link failures in optical networks is becoming increasingly important due to the increasing data rate in the fiber. Path protection schemes attempt to guarantee a bac...
Srinivasan Ramasubramanian