Sciweavers

597 search results - page 81 / 120
» Combinatorial Models for Cooperation Networks
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
14 years 1 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
DSN
2007
IEEE
14 years 3 months ago
On a Modeling Framework for the Analysis of Interdependencies in Electric Power Systems
Nowadays, economy, security and quality of life heavily depend on the resiliency of a number of critical infrastructures, including the Electric Power System (EPS), through which ...
Silvano Chiaradonna, Paolo Lollini, Felicita Di Gi...
ICPPW
2006
IEEE
14 years 3 months ago
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications
Trust, the fundamental basis of ‘cooperation’ – one of the most important characteristics for the performance of pervasive ad hoc network-- is under serious threat with the ...
Munirul M. Haque, Sheikh Iqbal Ahamed
ECEASST
2008
112views more  ECEASST 2008»
13 years 9 months ago
Flexible Modeling of Emergency Scenarios using Reconfigurable Systems
In emergency scenarios we can obtain a more effective coordination among team members constituting a mobile ad hoc network (MANET) through the use of reconfigurable systems. This ...
Kathrin Hoffmann, Hartmut Ehrig, Julia Padberg
UAI
2004
13 years 10 months ago
Bayesian Biosurveillance of Disease Outbreaks
Early, reliable detection of disease outbreaks is a critical problem today. This paper reports an investigation of the use of causal Bayesian networks to model spatio-temporal pat...
Gregory F. Cooper, Denver Dash, John Levander, Wen...