Sciweavers

52 search results - page 9 / 11
» A Taxonomy of Rational Attacks
Sort
View
IPPS
2006
IEEE
14 years 1 months ago
Improving cooperation in peer-to-peer systems using social networks
Rational and selfish nodes in P2P systems usually lack effective incentives to cooperate, contributing to the increase of free-riders, and degrading the system performance. Variou...
Wenyu Wang, Li Zhao, Ruixi Yuan
ISAAC
2004
Springer
142views Algorithms» more  ISAAC 2004»
14 years 1 months ago
On Partial Lifting and the Elliptic Curve Discrete Logarithm Problem
It has been suggested that a major obstacle in finding an index calculus attack on the elliptic curve discrete logarithm problem lies in the difficulty of lifting points from elli...
Qi Cheng, Ming-Deh A. Huang
HICSS
2009
IEEE
128views Biometrics» more  HICSS 2009»
13 years 11 months ago
Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models
To facilitate rational decision making regarding cyber security investments, decision makers need to be able to assess expected losses before and after potential investments. This...
Teodor Sommestad, Mathias Ekstedt, Pontus Johnson
IEEESP
2010
99views more  IEEESP 2010»
13 years 6 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
JCS
2002
103views more  JCS 2002»
13 years 7 months ago
Toward Cost-Sensitive Modeling for Intrusion Detection and Response
Intrusion detection systems (IDSs) must maximize the realization of security goals while minimizing costs. In this paper, we study the problem of building cost-sensitive intrusion...
Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. S...