Sciweavers

948 search results - page 45 / 190
» Making a Game of Network Security
Sort
View
INFOCOM
2011
IEEE
13 years 12 days ago
Secure friend discovery in mobile social networks
– Mobile social networks extend social networks in the cyberspace into the real world by allowing mobile users to discover and interact with existing and potential friends who ha...
Wei Dong, Vacha Dave, Lili Qiu, Yin Zhang
ICC
2009
IEEE
124views Communications» more  ICC 2009»
13 years 6 months ago
Routing Games for Traffic Engineering
Abstract--Current data network scenario makes Traffic Engineering (TE) a very challenging task. The ever growing access rates and new applications running on end-hosts result in mo...
Federico Larroca, Jean-Louis Rougier
INFOCOM
2012
IEEE
11 years 11 months ago
Spectrum mobility games
Cognitive radio gives users the ability to switch channels and make use of dynamic spectral opportunities. However, switching channels takes time, and may disrupt the quality of a...
Richard Southwell, Jianwei Huang, Xin Liu
ETRICS
2006
14 years 10 days ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...
NN
2006
Springer
140views Neural Networks» more  NN 2006»
13 years 8 months ago
Neural mechanism for stochastic behaviour during a competitive game
Previous studies have shown that non-human primates can generate highly stochastic choice behaviour, especially when this is required during a competitive interaction with another...
Alireza Soltani, Daeyeol Lee, Xiao-Jing Wang