Sciweavers

409 search results - page 18 / 82
» E-Net Models of a Software System for E-Mail Security
Sort
View
FSKD
2007
Springer
102views Fuzzy Logic» more  FSKD 2007»
13 years 9 months ago
Statistical and Fuzzy Approach for Database Security
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on sta...
Gang Lu, Junkai Yi, Kevin Lü
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 1 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
JCIT
2010
130views more  JCIT 2010»
13 years 2 months ago
Research on Simulation and Optimization of Transshipment Port Operation in a Power Coal Ocean Shipping Logistics System on the B
With China's rapid economic development, electricity supply is relatively shortage, and the contradiction of power coal supply and demand is prominent. In this context, using...
Yabin Li
ATAL
2011
Springer
12 years 7 months ago
GUARDS: game theoretic security allocation on a national scale
Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...
AGENTS
1997
Springer
13 years 11 months ago
Creatures: Artificial Life Autonomous Software Agents for Home Entertainment
This paper gives a technical description of Creatures, a commercial home-entertainment software package. Creatures provides a simulated environment in which exist a number of synt...
Stephen Grand, Dave Cliff, Anil Malhotra