Sciweavers

686 search results - page 99 / 138
» How Bayesians Debug
Sort
View
GAMESEC
2010
119views Game Theory» more  GAMESEC 2010»
13 years 7 months ago
Uncertainty in Interdependent Security Games
Abstract. Even the most well-motivated models of information security have application limitations due to the inherent uncertainties involving risk. This paper exemplifies a formal...
Benjamin Johnson, Jens Grossklags, Nicolas Christi...
CORR
2011
Springer
202views Education» more  CORR 2011»
13 years 3 months ago
Network Estimation and Packet Delivery Prediction for Control over Wireless Mesh Networks
: Much of the current theory of networked control systems uses simple point-to-point communiodels as an abstraction of the underlying network. As a result, the controller has very ...
Phoebus Chen, Chithrupa Ramesh, Karl Henrik Johans...
ICICS
2009
Springer
14 years 3 months ago
Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence
We propose a novel approach for statistical risk modeling of network attacks that lets an operator perform risk analysis using a data model and an impact model on top of an attack ...
Tomas Olsson
SP
2006
IEEE
123views Security Privacy» more  SP 2006»
14 years 3 months ago
A Framework for the Evaluation of Intrusion Detection Systems
Classification accuracy in intrusion detection systems (IDSs) deals with such fundamental problems as how to compare two or more IDSs, how to evaluate the performance of an IDS, ...
Alvaro A. Cárdenas, John S. Baras, Karl Sea...
LSO
2004
Springer
14 years 2 months ago
COTS Evaluation Supported by Knowledge Bases
Selection of Commercial-off-The-Shelf (COTS) software products is a knowledge-intensive process. In this paper, we show how knowledge bases can be used to facilitate the COTS selec...
Abdallah Mohamed, Tom Wanyama, Günther Ruhe, ...