Sciweavers

948 search results - page 92 / 190
» Making a Game of Network Security
Sort
View
IJWMC
2007
103views more  IJWMC 2007»
15 years 1 months ago
Interworking of 3G cellular networks and wireless LANs
: The Third Generation (3G) cellular networks provide ubiquitous connectivity but low data rates, whereas Wireless Local Area Networks (WLANs) can offer much higher data rates but ...
Wei Song, Weihua Zhuang, Aladdin Saleh
ATAL
2010
Springer
15 years 3 months ago
A graph-theoretic approach to protect static and moving targets from adversaries
The static asset protection problem (SAP) in a road network is that of allocating resources to protect vertices, given any possible behavior by an adversary determined to attack t...
John P. Dickerson, Gerardo I. Simari, V. S. Subrah...
DSN
2009
IEEE
14 years 11 months ago
RRE: A game-theoretic intrusion Response and Recovery Engine
Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in a...
Saman A. Zonouz, Himanshu Khurana, William H. Sand...
STOC
2012
ACM
256views Algorithms» more  STOC 2012»
13 years 4 months ago
Competitive contagion in networks
We develop a game-theoretic framework for the study of competition between firms who have budgets to “seed” the initial adoption of their products by consumers located in a s...
Sanjeev Goyal, Michael Kearns
OOPSLA
2009
Springer
15 years 6 months ago
Fault-based combinatorial testing of web services
Abstract—The Internet houses diverse applications (i.e., banking, networking, etc.), commonly implemented as web services. Web services are flexible but can become complex, maki...
Bellanov S. Apilli