Sciweavers

529 search results - page 26 / 106
» Model checking detectability of attacks in multiagent system...
Sort
View
JCP
2007
127views more  JCP 2007»
13 years 7 months ago
Defending Cyberspace with Fake Honeypots
—Honeypots are computer systems designed for no purpose other than recording attacks on them. Cyberattackers should avoid them since honeypots jeopardize the secrecy of attack me...
Neil C. Rowe, E. John Custy, Binh T. Duong
RSFDGRC
2005
Springer
156views Data Mining» more  RSFDGRC 2005»
14 years 1 months ago
Intrusion Detection System Based on Multi-class SVM
In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Hansung Lee, Jiyoung Song, Daihee Park
RTSS
2005
IEEE
14 years 1 months ago
Fast On-the-Fly Parametric Real-Time Model Checking
This paper presents a local algorithm for solving the universal parametric real-time model-checking problem. The problem may be phrased as follows: given a real-time system and te...
Dezhuang Zhang, Rance Cleaveland
CEAS
2011
Springer
12 years 7 months ago
Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems
Web mail providers rely on users to “vote” to quickly and collaboratively identify spam messages. Unfortunately, spammers have begun to use bots to control large collections o...
Anirudh Ramachandran, Anirban Dasgupta, Nick Feams...
ICEIS
2008
IEEE
14 years 2 months ago
Hippocratic Multi-Agent Systems
The current evolution of Information Technology leads to the increase of automatic data processing over multiple information systems. The data we deal with concerns sensitive infor...
Ludivine Crépin, Laurent Vercouter, Olivier...