Sciweavers

3193 search results - page 95 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
ICC
2009
IEEE
127views Communications» more  ICC 2009»
14 years 2 months ago
Security Games with Incomplete Information
—We study two-player security games which can be viewed as sequences of nonzero-sum matrix games where at each stage of the iterations the players make imperfect observations of ...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
HICSS
2003
IEEE
139views Biometrics» more  HICSS 2003»
14 years 1 months ago
Modeling of information dominance in complex systems: A system partitioning and hybrid control framework
This paper1 provides a view of modeling the information dominance problem of military systems as representative of modeling other complex systems. The ideas are an extension of ea...
John R. James
IACR
2011
223views more  IACR 2011»
12 years 7 months ago
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping
Abstract. We describe and analyze the password-based key establishment protocol PACE v2 Integrated Mapping (IM), an evolution of PACE v1 jointly proposed by Gemalto and Sagem S´ec...
Jean-Sébastien Coron, Aline Gouget, Thomas ...
GD
2008
Springer
13 years 9 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
CLEF
2009
Springer
13 years 9 months ago
Simulating Morphological Analyzers with Stochastic Taggers for Confidence Estimation
We propose a method for providing stochastic confidence estimates for rule-based and black-box natural language (NL) processing systems. Our method does not require labeled trainin...
Christian Monson, Kristy Hollingshead, Brian Roark