Sciweavers

222 search results - page 25 / 45
» Equilibria for Networks with Malicious Users
Sort
View
FGCS
2000
131views more  FGCS 2000»
13 years 7 months ago
Keystroke dynamics as a biometric for authentication
More than ever before the Internet is changing computing as we know it. Global access to information and resources is becoming an integral part of nearly every aspect of our lives...
Fabian Monrose, Aviel D. Rubin
AIMS
2011
Springer
12 years 11 months ago
Finding and Analyzing Evil Cities on the Internet
Abstract. IP Geolocation is used to determine the geographical location of Internet users based on their IP addresses. When it comes to security, most of the traditional geolocatio...
Matthijs G. T. van Polen, Giovane Cesar Moreira Mo...
RAID
2010
Springer
13 years 5 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
SIGCOMM
2010
ACM
13 years 7 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
MOBIHOC
2010
ACM
13 years 5 months ago
Spectrum pricing games with bandwidth uncertainty and spatial reuse in cognitive radio networks
In cognitive radio networks (CRN), primary users can lease out their unused bandwidth to secondary users in return for a fee. We study price competition in a CRN with multiple pri...
Gaurav S. Kasbekar, Saswati Sarkar