Sciweavers

201 search results - page 34 / 41
» A Network Game with Attackers and a Defender
Sort
View
ROBOCUP
1999
Springer
113views Robotics» more  ROBOCUP 1999»
13 years 11 months ago
11Monkeys Description
The major purpose of our research is to study cooperative planning for multi-agent system in time-critical environment. The RoboCup simulator league is the most interesting target ...
Shuhei Kinoshita, Yoshikazu Yamamoto
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
13 years 8 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
CORR
2008
Springer
121views Education» more  CORR 2008»
13 years 7 months ago
The Forgiving Tree: A Self-Healing Distributed Data Structure
We consider the problem of self-healing in peer-to-peer networks that are under repeated attack by an omniscient adversary. We assume that the following process continues for up t...
Tom Hayes, Navin Rustagi, Jared Saia, Amitabh Treh...
INFOCOM
2007
IEEE
14 years 1 months ago
SPREAD: Foiling Smart Jammers Using Multi-Layer Agility
— In this paper, we address the problem of cross-layer denial of service attack in wireless data networks. We introduce SPREAD - a novel adaptive diversification approach to pro...
Xin Liu, Guevara Noubir, Ravi Sundaram, San Tan
ICDCS
2010
IEEE
13 years 11 months ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...