Sciweavers

507 search results - page 2 / 102
» Defensive Marketing Strategies
Sort
View
NCA
2003
IEEE
14 years 27 days ago
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense
Attacks against distributed systems frequently start at the network layer by gathering network related information (such as open TCP ports) and continue on by exhausting resources...
Michael Atighetchi, Partha Pratim Pal, Franklin We...
AMMA
2009
Springer
14 years 2 months ago
Impact of Misalignment of Trading Agent Strategy across Multiple Markets
We examine the effect of a market pricing policy designed to attract high-valued traders in a multiple market context using JCAT software. Our experiments show that a simple change...
Jung-woo Sohn, Sooyeon Lee, Tracy Mullen
PADS
2005
ACM
14 years 1 months ago
Microscopic Simulation of a Group Defense Strategy
We introduce a novel worm containment strategy that integrates two complementary worm quarantine techniques. The two techniques are linked, with one strategy employing the other a...
Linda Briesemeister, Phillip A. Porras
NETWORK
2006
177views more  NETWORK 2006»
13 years 7 months ago
Jamming sensor networks: attack and defense strategies
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduct radio interference, or jamming, attacks that effectively cause a denial of se...
Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang
IEEEARES
2006
IEEE
14 years 1 months ago
Evaluation of Network Robustness for Given Defense Resource Allocation Strategies
Since the 9/11 terrorist attacks, the effective and efficient protection of critical information infrastructures has become an even more important issue. To enhance network surviv...
Y.-S. Lin, P.-H. Tsang, C.-H. Chen, C.-L. Tseng, Y...