Sciweavers

44 search results - page 7 / 9
» High-Fidelity Modeling of Computer Network Worms
Sort
View
ICDCS
2010
IEEE
13 years 11 months ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...
BMCBI
2011
12 years 11 months ago
PRIN, a predicted rice interactome network
Background: Protein-protein interactions play a fundamental role in elucidating the molecular mechanisms of biomolecular function, signal transductions and metabolic pathways of l...
Haibin Gu, Pengcheng Zhu, Yinming Jiao, Yijun Meng...
WS
2006
ACM
14 years 1 months ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
SYNASC
2005
IEEE
97views Algorithms» more  SYNASC 2005»
14 years 1 months ago
A Reinforcement Learning Algorithm for Spiking Neural Networks
The paper presents a new reinforcement learning mechanism for spiking neural networks. The algorithm is derived for networks of stochastic integrate-and-fire neurons, but it can ...
Razvan V. Florian
VALUETOOLS
2006
ACM
107views Hardware» more  VALUETOOLS 2006»
14 years 1 months ago
Thresholds for virus spread on networks
We study how the spread of computer viruses, worms, and other self-replicating malware is affected by the logical topology of the network over which they propagate. We consider a...
Moez Draief, Ayalvadi J. Ganesh, Laurent Massouli&...