Sciweavers

3451 search results - page 490 / 691
» Collaborative attack modeling
Sort
View
ISI
2006
Springer
13 years 9 months ago
An Info-Gap Approach to Policy Selection for Bio-terror Response
Bio-terror events are accompanied by severe uncertainty: great disparity between the best available data and models, and the actual course of events. We model this uncertainty with...
Anna Yoffe, Yakov Ben-Haim
JUCS
2010
157views more  JUCS 2010»
13 years 8 months ago
Entropy Optimization of Social Networks Using an Evolutionary Algorithm
: Recent work on social networks has tackled the measurement and optimization of these networks’ robustness and resilience to both failures and attacks. Different metrics have be...
Maytham Safar, Nosayba El-Sayed, Khaled Mahdi, Dav...
ATAL
2010
Springer
13 years 10 months ago
ALIVE: an agent-based framework for dynamic and robust service-oriented applications
Service-oriented systems are becoming more and more nodes in a digital, dynamic ecosystem requiring the identification and establishment of flexible, spontaneous collaboration act...
Javier Vázquez-Salceda, Wamberto Weber Vasc...
CCS
2009
ACM
14 years 10 months ago
Hidden credential retrieval from a reusable password
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access ...
Xavier Boyen
CCS
2009
ACM
14 years 10 months ago
The union-split algorithm and cluster-based anonymization of social networks
Knowledge discovery on social network data can uncover latent social trends and produce valuable findings that benefit the welfare of the general public. A growing amount of resea...
Brian Thompson, Danfeng Yao