Sciweavers

222 search results - page 5 / 45
» Equilibria for Networks with Malicious Users
Sort
View
ICC
2007
IEEE
14 years 1 months ago
Using Session-Keystroke Mutual Information to Detect Self-Propagating Malicious Codes
— In this paper, we propose an endpoint-based joint network-host anomaly detection technique to detect selfpropagating malicious codes. Our proposed technique is based on the obs...
Syed A. Khayam, Hayder Radha
STACS
1999
Springer
13 years 11 months ago
Worst-case Equilibria
We investigate the problem of routing traffic through a congested network in an environment of non-cooperative users. We use the worst-case coordination ratio suggested by Koutsou...
Elias Koutsoupias, Christos H. Papadimitriou
ACNS
2006
Springer
87views Cryptology» more  ACNS 2006»
13 years 11 months ago
Effect of Malicious Synchronization
Abstract. We study the impact of malicious synchronization on computer systems that serve customers periodically. Systems supporting automatic periodic updates are common in web se...
Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng So...
ISAAC
2005
Springer
104views Algorithms» more  ISAAC 2005»
14 years 26 days ago
Network Load Games
We study network load games, a class of routing games in networks which generalize selfish routing games on networks consisting of parallel links. In these games, each user aims t...
Ioannis Caragiannis, Clemente Galdi, Christos Kakl...
SIROCCO
2010
13 years 8 months ago
Towards Network Games with Social Preferences
Many distributed systems can be modeled as network games: a collection of selfish players that communicate in order to maximize their individual utilities. The performance of such ...
Petr Kuznetsov, Stefan Schmid