Sciweavers

1019 search results - page 109 / 204
» Cryptographic Design Vulnerabilities
Sort
View
ECR
2010
112views more  ECR 2010»
15 years 3 months ago
TREET: the Trust and Reputation Experimentation and Evaluation Testbed
Abstract To date, trust and reputation systems have often been evaluated using methods of their designers' own devising. Recently, we demonstrated that a number of noteworthy ...
Reid Kerr, Robin Cohen
EOR
2007
123views more  EOR 2007»
15 years 3 months ago
A stochastic model for risk management in global supply chain networks
With the increasing emphasis on supply chain vulnerabilities, effective mathematical tools for analyzing and understanding appropriate supply chain risk management are now attrac...
Mark Goh, Joseph Y. S. Lim, Fanwen Meng
JNW
2008
118views more  JNW 2008»
15 years 2 months ago
The Derivation and Use of a Scalable Model for Network Attack Identification and Path Prediction
The rapid growth of the Internet has triggered an explosion in the number of applications that leverage its capabilities. Unfortunately, many are designed to burden o infrastructur...
Sanjeeb Nanda, Narsingh Deo
TON
2010
119views more  TON 2010»
15 years 2 months ago
Thwarting zero-day polymorphic worms with network-level length-based signature generation
—It is crucial to detect zero-day polymorphic worms and to generate signatures at network gateways or honeynets so that we can prevent worms from propagating at their early phase...
Lanjia Wang, Zhichun Li, Yan Chen, Zhi Fu, Xing Li
AICS
2009
15 years 1 months ago
Robustness Analysis of Model-Based Collaborative Filtering Systems
Collaborative filtering (CF) recommender systems are very popular and successful in commercial application fields. However, robustness analysis research has shown that conventional...
Zunping Cheng, Neil Hurley