Sciweavers

103 search results - page 8 / 21
» A Graph-Theoretic Network Security Game
Sort
View
WAOA
2010
Springer
239views Algorithms» more  WAOA 2010»
13 years 7 months ago
Strategic Multiway Cut and Multicut Games
We consider cut games where players want to cut themselves off from different parts of a network. These games arise when players want to secure themselves from areas of potential i...
Elliot Anshelevich, Bugra Caskurlu, Ameya Hate
NOSSDAV
2009
Springer
14 years 4 months ago
Probabilistic event resolution with the pairwise random protocol
Peer-to-peer distributed virtual environments (DVE's) distribute state tracking and state transitions. Many DVE's - such as online games - require ways to fairly determi...
John L. Miller, Jon Crowcroft
CSFW
2006
IEEE
14 years 3 months ago
Games for Controls
We argue that games are expressive enough to encompass (history-based) access control, (resource) usage control (e.g., dynamic adaptive access control of reputation systems), acco...
Krishnendu Chatterjee, Radha Jagadeesan, Corin Pit...
COCOON
2011
Springer
12 years 9 months ago
Finding Paths with Minimum Shared Edges
Motivated by a security problem in geographic information systems, we study the following graph theoretical problem: given a graph G, two special nodes s and t in G, and a number k...
Masoud T. Omran, Jörg-Rüdiger Sack, Hami...
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
13 years 11 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar