Sciweavers

394 search results - page 50 / 79
» Game theoretic models for detecting network intrusions
Sort
View
INFOCOM
2000
IEEE
15 years 1 months ago
Peering and Provisioning of Differentiated Internet Services
A key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where allo...
Nemo Semret, Raymond R.-F. Liao, Andrew T. Campbel...
CORR
2004
Springer
104views Education» more  CORR 2004»
14 years 9 months ago
Near Rationality and Competitive Equilibria in Networked Systems
A growing body of literature in networked systems research relies on game theory and mechanism design to model and address the potential lack of cooperation between self-intereste...
Nicolas Christin, Jens Grossklags, John Chuang
GLOBECOM
2006
IEEE
15 years 3 months ago
A Game for Ad Hoc Network Connectivity in the Presence of Malicious Users
— Ad hoc network users are resource constrained: Before transmitting data, they have to take into account the energy expenditure involved. Even if a user is, in principle, willin...
George Theodorakopoulos, John S. Baras
86
Voted
ICPPW
2002
IEEE
15 years 2 months ago
A Structural Framework for Modeling Multi-Stage Network Attacks
Incidents such as Solar Sunrise and Nimda demonstrate the need to expressively model distributed and complex network attacks. To protect information systems, system administrators...
Kristopher Daley, Ryan Larson, Jerald Dawkins
75
Voted
ACMSE
2005
ACM
15 years 3 months ago
Investigating hidden Markov models capabilities in anomaly detection
Hidden Markov Model (HMM) based applications are common in various areas, but the incorporation of HMM's for anomaly detection is still in its infancy. This paper aims at cla...
Shrijit S. Joshi, Vir V. Phoha