Sciweavers

948 search results - page 125 / 190
» Making a Game of Network Security
Sort
View
MDM
2007
Springer
148views Communications» more  MDM 2007»
15 years 4 months ago
Enforcing Data Integrity in Very Large Ad Hoc Networks
Ad hoc networks rely on nodes forwarding each other’s packets, making trust and cooperation key issues for ensuring network performance. As long as all nodes in the network belo...
Daniela Gavidia, Maarten van Steen
SIGOPSE
2004
ACM
15 years 3 months ago
Open problems in data collection networks
Research in sensor networks, continuous queries (CQ), and other domains has been motivated by powerful applications that aim to aggregate, assimilate, and interact with scores of ...
Jonathan Ledlie, Jeffrey Shneidman, Matt Welsh, Me...
CCS
2007
ACM
15 years 4 months ago
Implementing and testing dynamic timeout adjustment as a dos counter-measure
In this paper we experimentally analyse various dynamic timeout adjustment strategies in server queues as potential counter-measures against degradation of service attacks. Previo...
Daniel Boteanu, Edouard Reich, José M. Fern...
PAMI
2007
186views more  PAMI 2007»
14 years 9 months ago
Value-Directed Human Behavior Analysis from Video Using Partially Observable Markov Decision Processes
—This paper presents a method for learning decision theoretic models of human behaviors from video data. Our system learns relationships between the movements of a person, the co...
Jesse Hoey, James J. Little
INFOCOM
2007
IEEE
15 years 4 months ago
Modeling Malware Propagation in Networks of Smart Cell Phones with Spatial Dynamics
Abstract— Recent outbreaks of virus and worm attacks targeted at cell phones have have bought to the forefront the seriousness of the security threat to this increasingly popular...
Krishna K. Ramachandran, Biplab Sikdar