Sciweavers

73 search results - page 6 / 15
» Algorithms for Interdependent Security Games
Sort
View
WINE
2005
Springer
179views Economy» more  WINE 2005»
14 years 13 days ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
WAOA
2010
Springer
239views Algorithms» more  WAOA 2010»
13 years 4 months ago
Strategic Multiway Cut and Multicut Games
We consider cut games where players want to cut themselves off from different parts of a network. These games arise when players want to secure themselves from areas of potential i...
Elliot Anshelevich, Bugra Caskurlu, Ameya Hate
ATAL
2011
Springer
12 years 7 months ago
AgentC: agent-based system for securing maritime transit
Recent rise in maritime piracy prompts the search for novel techniques for addressing the problem. We therefore developed AgentC, a prototype system that demonstrates how agent-ba...
Michal Jakob, Ondrej Vanek, Branislav Bosansk&yacu...
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
13 years 8 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
CRITIS
2007
13 years 8 months ago
A Malware Detector Placement Game for Intrusion Detection
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...