Sciweavers

156 search results - page 17 / 32
» Insider Threat Analysis Using Information-Centric Modeling
Sort
View
PE
2006
Springer
114views Optimization» more  PE 2006»
13 years 7 months ago
On the performance of Internet worm scanning strategies
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become one of the major threats to the security of the Internet. In order to defend agai...
Cliff Changchun Zou, Donald F. Towsley, Weibo Gong
ANSS
2002
IEEE
14 years 15 days ago
A Simulation Based Performance Analysis of a TCP Extension for Best-Effort Multimedia Applications
Since TCP is considered unsuitable for the majority of the emerging multimedia applications, these applications primarily use UDP transport together with proprietary congestion co...
Karl-Johan Grinnemo, Anna Brunstrom
GAMESEC
2011
287views Game Theory» more  GAMESEC 2011»
12 years 7 months ago
Collaborative Location Privacy with Rational Users
Recent smartphones incorporate embedded GPS devices that enable users to obtain geographic information about their surroundings by providing a location-based service (LBS) with the...
Francisco Santos, Mathias Humbert, Reza Shokri, Je...
REFSQ
2009
Springer
14 years 2 months ago
Composing Models for Detecting Inconsistencies: A Requirements Engineering Perspective
Abstract. [Context and motivation] Ever-growing systems’ complexity and novel requirements engineering approaches such as reuse or globalization imply that requirements are produ...
Gilles Perrouin, Erwan Brottier, Benoit Baudry, Yv...
ICASSP
2011
IEEE
12 years 11 months ago
Bayesian topic models for describing computer network behaviors
We consider the use of Bayesian topic models in the analysis of computer network traffic. Our approach utilizes latent Dirichlet allocation and time-varying dynamic latent Dirich...
Christopher Cramer, Lawrence Carin