Sciweavers

549 search results - page 56 / 110
» Belief-Based Risk Analysis
Sort
View
FC
2005
Springer
94views Cryptology» more  FC 2005»
15 years 5 months ago
Modeling and Preventing Phishing Attacks
We introduce tools to model and describe phishing attacks, allowing a visualization and quantification of the threat on a given complex system of web services. We use our new mod...
Markus Jakobsson
MADNES
2005
Springer
15 years 5 months ago
Detecting Impersonation Attacks in Future Wireless and Mobile Networks
Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation atta...
Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis
HICSS
2002
IEEE
100views Biometrics» more  HICSS 2002»
15 years 4 months ago
Using Weather Derivatives to Improve the Efficiency of Forward Markets for Electricity
The analysis in this paper demonstrates that a combination of 1) a forward contact, with fixed price for both base land and peaking power, and 2) a collar option for the number of...
Timothy Mount
ISCC
2000
IEEE
125views Communications» more  ISCC 2000»
15 years 4 months ago
Security Requirements for Management Systems Using Mobile Agents
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive...
Helmut Reiser, Gerald Vogt
FLAIRS
2007
15 years 2 months ago
Foundations of Similarity and Utility
In this paper we discuss a rigorous foundation of similarity reasoning based on the concept of utility. If utility is formulated in mathematical terms it can serve as a formal spe...
Michael M. Richter