Sciweavers

762 search results - page 39 / 153
» Modeling and Simulating Information Security Management
Sort
View
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
14 years 7 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
WSC
2000
13 years 9 months ago
Understanding the impact of equipment and process changes with a heterogeneous semiconductor manufacturing simulation environmen
Simulation models are useful to predict and understand the impact of changes to a manufacturing system. Typical factory simulation models include the parts being manufactured in t...
Jeffrey W. Herrmann, Brian F. Conaghan, Laurent He...
WSC
2004
13 years 9 months ago
A Scenario Generation Tool for DDF Simulation Testbeds
An interactive tool has been developed for visualizing and creating scaled battlefield based scenarios for use in a simulation testbed to develop and test distributed data fusion ...
Govindarajan Srimathveeravalli, Navneeth Subramani...
ACSAC
2004
IEEE
13 years 11 months ago
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Ajay K. Gupta 0002, Daniel C. DuVarney
JSAC
2006
181views more  JSAC 2006»
13 years 7 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu