Sciweavers

405 search results - page 67 / 81
» Avatar-centric Risk Evaluation
Sort
View
CORR
2010
Springer
116views Education» more  CORR 2010»
14 years 4 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...
JMLR
2010
185views more  JMLR 2010»
14 years 4 months ago
Efficient Heuristics for Discriminative Structure Learning of Bayesian Network Classifiers
We introduce a simple order-based greedy heuristic for learning discriminative structure within generative Bayesian network classifiers. We propose two methods for establishing an...
Franz Pernkopf, Jeff A. Bilmes
111
Voted
TSMC
2010
14 years 4 months ago
Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs
In mobile ad hoc networks, nodes have the inherent ability to move. Aside from conducting attacks to maximize their utility and cooperating with regular nodes to deceive them, mali...
Feng Li, Yinying Yang, Jie Wu
ECWEB
2011
Springer
277views ECommerce» more  ECWEB 2011»
13 years 9 months ago
Trust-Based Selection of Partners
The community of multi-agent systems has been studying ways to improve the selection of partner agents for joint action. One of such approaches consists in estimating the trustwort...
Joana Urbano, Ana Paula Rocha, Eugénio C. O...
TON
2012
13 years 3 days ago
On New Approaches of Assessing Network Vulnerability: Hardness and Approximation
—Society relies heavily on its networked physical infrastructure and information systems. Accurately assessing the vulnerability of these systems against disruptive events is vit...
Thang N. Dinh, Ying Xuan, My T. Thai, Panos M. Par...