Sciweavers

762 search results - page 84 / 153
» Modeling and Simulating Information Security Management
Sort
View
DISCEX
2003
IEEE
14 years 1 months ago
Cooperative Response Strategies for Large Scale Attack Mitigation
We introduce models for cooperative mitigating response strategies to suppress large scale Internet worm attack. In our models, cooperating members communicate with others using a...
D. Nojiri, Jeff Rowe, Karl N. Levitt
IDEAL
2005
Springer
14 years 1 months ago
Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
Álvaro Herrero, Emilio Corchado, José...
SASN
2004
ACM
14 years 1 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
CONTEXT
2007
Springer
14 years 2 months ago
Default Inferences in Metaphor Interpretation
In this paper we provide a formalization of a set of default rules that we claim are required for the transfer of information such as causation, event rate and duration in the inte...
Rodrigo Agerri, John A. Barnden, Mark G. Lee, Alan...
SUTC
2010
IEEE
13 years 11 months ago
Generic Information Transport for Wireless Sensor Networks
—A primary functionality of wireless sensor networks (WSNs) is transporting the information acquired by the sensors as per the desired application requirements. The diverse appli...
Faisal Karim Shaikh, Abdelmajid Khelil, Brahim Aya...