Sciweavers

438 search results - page 70 / 88
» On the Applicability of Knowledge Based NAT-Traversal for Ho...
Sort
View
WWW
2005
ACM
14 years 8 months ago
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
Reputation systems have been popular in estimating the trustworthiness and predicting the future behavior of nodes in a large-scale distributed system where nodes may transact wit...
Mudhakar Srivatsa, Li Xiong, Ling Liu
IDA
2008
Springer
13 years 8 months ago
Symbolic methodology for numeric data mining
Currently statistical and artificial neural network methods dominate in data mining applications. Alternative relational (symbolic) data mining methods have shown their effectivene...
Boris Kovalerchuk, Evgenii Vityaev
INFOCOM
2008
IEEE
14 years 2 months ago
Temporal Delay Tomography
Abstract—Multicast-based network tomography enables inference of average loss rates and delay distributions of internal network links from end-to-end measurements of multicast pr...
Vijay Arya, Nick G. Duffield, Darryl Veitch
ACSAC
2004
IEEE
13 years 11 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
AIMSA
2004
Springer
13 years 11 months ago
Identification of Communities of Peers by Trust and Reputation
In: Proceedings of the Eleventh International Conference on Artificial Intelligence: Methodology, Systems, Applications (AIMSA-04), Springer-Verlag LNAI Series. c 2004 We present ...
Alessandro Agostini, Gianluca Moro