Sciweavers

1683 search results - page 126 / 337
» A Needed Narrowing Strategy
Sort
View
ITICSE
2006
ACM
14 years 4 months ago
Don't be a phish: steps in user education
Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced i...
Stefan A. Robila, James W. Ragucci
SASN
2006
ACM
14 years 4 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
DSN
2005
IEEE
14 years 3 months ago
Perturbation-Resistant and Overlay-Independent Resource Discovery
This paper realizes techniques supporting the position that strategies for resource location and discovery in distributed systems should be both perturbation-resistant and overlay...
Steven Y. Ko, Indranil Gupta
INFOCOM
2005
IEEE
14 years 3 months ago
The effect of DNS delays on worm propagation in an IPv6 Internet
— It is a commonly held belief that IPv6 provides greater security against random-scanning worms by virtue of a very sparse address space. We show that an intelligent worm can ex...
Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos ...
ISIPTA
2005
IEEE
168views Mathematics» more  ISIPTA 2005»
14 years 3 months ago
Bayesianism Without Priors, Acts Without Consequences
: A generalization of subjective expected utility is presented in which the primitives are a finite set of states of the world, a finite set of strategies available to the decision...
Robert Nau