Sciweavers

1318 search results - page 58 / 264
» Measuring network security using dynamic bayesian network
Sort
View
117
Voted
CCS
2004
ACM
15 years 7 months ago
IP covert timing channels: design and detection
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. In...
Serdar Cabuk, Carla E. Brodley, Clay Shields
141
Voted
CORR
2010
Springer
187views Education» more  CORR 2010»
15 years 2 months ago
Learning in A Changing World: Non-Bayesian Restless Multi-Armed Bandit
We consider the restless multi-armed bandit (RMAB) problem with unknown dynamics. In this problem, at each time, a player chooses K out of N (N > K) arms to play. The state of ...
Haoyang Liu, Keqin Liu, Qing Zhao
135
Voted
ICASSP
2011
IEEE
14 years 6 months ago
Logarithmic weak regret of non-Bayesian restless multi-armed bandit
Abstract—We consider the restless multi-armed bandit (RMAB) problem with unknown dynamics. At each time, a player chooses K out of N (N > K) arms to play. The state of each ar...
Haoyang Liu, Keqin Liu, Qing Zhao
ESANN
2000
15 years 3 months ago
Confidence estimation methods for neural networks : a practical comparison
Feed-forward neural networks (Multi-Layered Perceptrons) are used widely in real-world regression or classification tasks. A reliable and practical measure of prediction "conf...
Georgios Papadopoulos, Peter J. Edwards, Alan F. M...
137
Voted
NDSS
2009
IEEE
15 years 9 months ago
SybilInfer: Detecting Sybil Nodes using Social Networks
SybilInfer is an algorithm for labelling nodes in a social network as honest users or Sybils controlled by an adversary. At the heart of SybilInfer lies a probabilistic model of h...
George Danezis, Prateek Mittal