Sciweavers

394 search results - page 50 / 79
» Game theoretic models for detecting network intrusions
Sort
View
INFOCOM
2000
IEEE
13 years 11 months ago
Peering and Provisioning of Differentiated Internet Services
A key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where allo...
Nemo Semret, Raymond R.-F. Liao, Andrew T. Campbel...
CORR
2004
Springer
104views Education» more  CORR 2004»
13 years 7 months ago
Near Rationality and Competitive Equilibria in Networked Systems
A growing body of literature in networked systems research relies on game theory and mechanism design to model and address the potential lack of cooperation between self-intereste...
Nicolas Christin, Jens Grossklags, John Chuang
GLOBECOM
2006
IEEE
14 years 1 months ago
A Game for Ad Hoc Network Connectivity in the Presence of Malicious Users
— Ad hoc network users are resource constrained: Before transmitting data, they have to take into account the energy expenditure involved. Even if a user is, in principle, willin...
George Theodorakopoulos, John S. Baras
ICPPW
2002
IEEE
14 years 17 days ago
A Structural Framework for Modeling Multi-Stage Network Attacks
Incidents such as Solar Sunrise and Nimda demonstrate the need to expressively model distributed and complex network attacks. To protect information systems, system administrators...
Kristopher Daley, Ryan Larson, Jerald Dawkins
ACMSE
2005
ACM
14 years 1 months ago
Investigating hidden Markov models capabilities in anomaly detection
Hidden Markov Model (HMM) based applications are common in various areas, but the incorporation of HMM's for anomaly detection is still in its infancy. This paper aims at cla...
Shrijit S. Joshi, Vir V. Phoha