Sciweavers

1235 search results - page 148 / 247
» Formalizing information security knowledge
Sort
View
ICDIM
2007
IEEE
14 years 2 months ago
A complexity-based method for anti-spamming
A huge diversity of approaches is in use to deal with network security and spam in particular. In this paper, we focus on a relatively new approach whose foundations rely on the w...
F. Faure, M. Lopusniac, Gilles Richard, Muhammad F...
ISI
2004
Springer
14 years 1 months ago
Interactive Query Languages for Intelligence Tasks
Counterterrorism and intelligence tasks rely on the efficient collection, analysis and dissemination of information. While information systems play a key role in such tasks, databa...
Antonio Badia
ESORICS
2004
Springer
14 years 1 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
AMET
1998
Springer
14 years 3 days ago
Bidding Strategies for Trading Agents in Auction-Based Tournaments
Abstract. Auction-based electronic commerce is an increasingly interesting domain for AI researchers. In this paper we present an attempt towards the construction of trading agents...
Pere Garcia, Eduardo Giménez, Lluis Godo, J...
ALGOSENSORS
2004
Springer
13 years 11 months ago
Towards a Dynamical Model for Wireless Sensor Networks
In this paper we introduce a dynamical model for wireless sensor networks. We obtain a convergent martingale for the broadcast process in such networks. To our knowledge, such mart...
Pierre Leone, José D. P. Rolim