Sciweavers

1875 search results - page 203 / 375
» Modeling the Security of Steganographic Systems
Sort
View
SMC
2010
IEEE
117views Control Systems» more  SMC 2010»
14 years 11 months ago
A simulation modelling approach enabling joint emergency response operations
—A novel capability for modelling and simulating intra- and inter-organizational collaboration in an emergencyresponse domain is presented. This capability combines the prescript...
Nicola Bicocchi, William Ross, Mihaela Ulieru
APNOMS
2008
Springer
15 years 2 months ago
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the netwo...
Huy Anh Nguyen, Deokjai Choi
115
Voted
ISI
2008
Springer
15 years 3 days ago
A Generative Model for Statistical Determination of Information Content from Conversation Threads
We present a generative model for determining the information content of a message without analyzing the message content. Such a tool is useful for automated analysis of the vast ...
Yingjie Zhou, Malik Magdon-Ismail, William A. Wall...
ESORICS
2009
Springer
16 years 1 months ago
Model-Checking DoS Amplification for VoIP Session Initiation
Current techniques for the formal modeling analysis of DoS attacks do not adequately deal with amplification attacks that may target a complex distributed system as a whole rather ...
Carl A. Gunter, José Meseguer, Musab AlTurk...
AGENTS
1997
Springer
15 years 4 months ago
Modeling Motivations and Emotions as a Basis for Intelligent Behavior
We report on an experiment to implement an autonomous creature situated in a two-dimensional world, that shows various learning and problem-solving capabilities, within the Societ...
Dolores Cañamero