A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on sta...
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
With China's rapid economic development, electricity supply is relatively shortage, and the contradiction of power coal supply and demand is prominent. In this context, using...
Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...
This paper gives a technical description of Creatures, a commercial home-entertainment software package. Creatures provides a simulated environment in which exist a number of synt...