Sciweavers

507 search results - page 56 / 102
» Defensive Marketing Strategies
Sort
View
FS
2006
135views more  FS 2006»
13 years 9 months ago
Asymmetric Information in Fads Models
Fads models were introduced by Shiller (1984) and Summers (1986) as plausible alternatives to the efficient markets/constant expected returns assumptions. Under these models, loga...
Paolo Guasoni
ICC
2007
IEEE
111views Communications» more  ICC 2007»
14 years 4 months ago
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
Reiko Ann Miura-Ko, Nicholas Bambos
DSN
2005
IEEE
14 years 3 months ago
Modeling and Automated Containment of Worms
Self-propagating codes, called worms, such as Code Red, Nimda, and Slammer, have drawn significant attention due to their enormous adverse impact on the Internet. There is a grea...
Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi
INFOCOM
2005
IEEE
14 years 3 months ago
The effect of DNS delays on worm propagation in an IPv6 Internet
— It is a commonly held belief that IPv6 provides greater security against random-scanning worms by virtue of a very sparse address space. We show that an intelligent worm can ex...
Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos ...
CORR
2007
Springer
131views Education» more  CORR 2007»
13 years 9 months ago
Bayesian sequential change diagnosis
Sequential change diagnosis is the joint problem of detection and identification of a sudden and unobservable change in the distribution of a random sequence. In this problem, the...
Savas Dayanik, Christian Goulding, H. Vincent Poor