Sciweavers

92 search results - page 4 / 19
» Minimizing Expected Attacking Cost in Networks
Sort
View
IEEEARES
2006
IEEE
14 years 1 months ago
Evaluation of Network Robustness for Given Defense Resource Allocation Strategies
Since the 9/11 terrorist attacks, the effective and efficient protection of critical information infrastructures has become an even more important issue. To enhance network surviv...
Y.-S. Lin, P.-H. Tsang, C.-H. Chen, C.-L. Tseng, Y...
JCO
2006
67views more  JCO 2006»
13 years 7 months ago
Resource allocation for restoration of compromised systems
Computer systems are constantly under the threats of being attacked and in many cases these attacks succeed. Today's networked systems are thus built to be intrusion tolerant....
Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong
ICIP
2006
IEEE
14 years 8 months ago
Behavior Forensics in Traitors within Traitors for Scalable Multimedia
A cost effective attack against multimedia forensics is the multiuser collusion attack, in which several attackers mount attacks collectively to remove traces of the identifying f...
K. J. Ray Liu, H. Vicky Zhao
INFOCOM
2009
IEEE
14 years 1 months ago
Minimizing End-to-End Delay: A Novel Routing Metric for Multi-Radio Wireless Mesh Networks
—This paper studies how to select a path with the minimum cost in terms of expected end-to-end delay (EED) in a multi-radio wireless mesh network. Different from the previous eff...
Hongkun Li, Yu Cheng, Chi Zhou, Weihua Zhuang
INFOCOM
2011
IEEE
12 years 10 months ago
A dynamic game solution to malware attack
—Given the flexibility that software-based operation provides, it is unreasonable to expect that new malware will demonstrate a fixed behavior over time. Instead, malware can d...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman