The security threat posed by malware in mobile wireless networks can be countered through immunization using security patches. The distribution of patches however consumes bandwidt...
Hierarchical systems have been widely used to provide scalable distributed services in the Internet. Unfortunately, such a service hierarchy is vulnerable to DoS attacks. This pap...
Hao Yang, Haiyun Luo, Yi Yang, Songwu Lu, Lixia Zh...
In this paper, we propose a new quantitative trust model for argumentation-based negotiating agents. The purpose of such a model is to provide a secure environment for agent negot...
Reputation-based mechanisms and policies are vulnerable to the submission of untruthful ratings. In this paper, we define and analyze a game-theoretic model that captures the dyn...
Today, critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other i...
Alysson Neves Bessani, Paulo Sousa, Miguel Correia...