Sciweavers

3451 search results - page 436 / 691
» Collaborative attack modeling
Sort
View
117
Voted
WSC
2004
15 years 4 months ago
On Using Monte Carlo Methods for Scheduling
Monte Carlo techniques have long been used (since Buffon's experiment to approximate the value of by tossing a needle onto striped paper) to analyze phenomena which, due to ...
Samarn Chantaravarapan, Ali K. Gunal, Edward J. Wi...
141
Voted
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 2 months ago
Stochastic Games for Security in Networks with Interdependent Nodes
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
103
Voted
EOR
2007
104views more  EOR 2007»
15 years 2 months ago
Optimal resource allocation for security in reliability systems
Recent results have used game theory to explore the nature of optimal investments in the security of simple series and parallel systems. However, it is clearly important in practi...
M. Naceur Azaiez, Vicki M. Bier
151
Voted
TMC
2008
109views more  TMC 2008»
15 years 2 months ago
Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is define...
Yun Wang, Xiaodong Wang, Bin Xie, Demin Wang, Dhar...
135
Voted
COMCOM
2002
189views more  COMCOM 2002»
15 years 2 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt