Sciweavers

1278 search results - page 218 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
SPW
1999
Springer
14 years 1 months ago
Performance of Protocols
This paper presents a comprehensive study on the performance of common MANET (mobile ad hoc network) routing protocols under realistic network scenarios. The routing protocols use...
Michael Roe
CN
2008
100views more  CN 2008»
13 years 9 months ago
Building resilient low-diameter peer-to-peer topologies
As more applications rely on underlying peer-to-peer topologies, the need for efficient and resilient infrastructure has become more pressing. A number of important classes of top...
Rita H. Wouhaybi, Andrew T. Campbell
ASIACRYPT
2010
Springer
13 years 7 months ago
Structured Encryption and Controlled Disclosure
We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we ...
Melissa Chase, Seny Kamara
DATAMINE
2010
189views more  DATAMINE 2010»
13 years 9 months ago
A game-theoretic framework to identify overlapping communities in social networks
In this paper, we introduce a game-theoretic framework to address the community detection problem based on the structures of social networks. We formulate the dynamics of community...
Wei Chen, Zhenming Liu, Xiaorui Sun, Yajun Wang
DSN
2009
IEEE
14 years 10 days ago
Sharing end-user negative symptoms for improving overlay network dependability
The dependability of overlay services rely on the overlay network’s capabilities to effectively diagnose and recover faults (e.g., link failures, overlay node outages). However,...
Yongning Tang, Ehab Al-Shaer