A huge diversity of approaches is in use to deal with network security and spam in particular. In this paper, we focus on a relatively new approach whose foundations rely on the w...
F. Faure, M. Lopusniac, Gilles Richard, Muhammad F...
Counterterrorism and intelligence tasks rely on the efficient collection, analysis and dissemination of information. While information systems play a key role in such tasks, databa...
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Abstract. Auction-based electronic commerce is an increasingly interesting domain for AI researchers. In this paper we present an attempt towards the construction of trading agents...
In this paper we introduce a dynamical model for wireless sensor networks. We obtain a convergent martingale for the broadcast process in such networks. To our knowledge, such mart...