Sciweavers

363 search results - page 22 / 73
» Modeling Attack Behaviors in Rating Systems
Sort
View
TSMC
2008
172views more  TSMC 2008»
13 years 7 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
SRDS
2007
IEEE
14 years 1 months ago
Activity Monitoring to Guarantee File Availability in Structured P2P File-sharing Systems
A cooperative structured peer-to-peer file-sharing system requires that the nodes participating in the system need to maintain the location mappings of other nodes. However, the s...
Guowei Huang, Zhi Chen, Qi Zhao, Gongyi Wu
ACNS
2004
Springer
128views Cryptology» more  ACNS 2004»
14 years 1 months ago
A Novel Framework for Alert Correlation and Understanding
Abstract. We propose a novel framework named Hidden Colored PetriNet for Alert Correlation and Understanding (HCPN-ACU) in intrusion detection system. This model is based upon the ...
Dong Yu, Deborah A. Frincke
CONCUR
2008
Springer
13 years 9 months ago
Distributed Timed Automata with Independently Evolving Clocks
Abstract. We propose a model of distributed timed systems where each component is a timed automaton with a set of local clocks that evolve at a rate independent of the clocks of th...
S. Akshay, Benedikt Bollig, Paul Gastin, Madhavan ...
IFIPTM
2010
113views Management» more  IFIPTM 2010»
13 years 6 months ago
Impact of Trust Management and Information Sharing to Adversarial Cost in Ranking Systems
Ranking systems such as those in product review sites and recommender systems usually use ratings to rank favorite items based on both their quality and popularity. Since higher ra...
Le-Hung Vu, Thanasis G. Papaioannou, Karl Aberer