Sciweavers

40 search results - page 5 / 8
» SCS: Securing the Future of Simulation
Sort
View
EMS
2008
IEEE
13 years 9 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
ACSAC
2004
IEEE
13 years 11 months ago
High-Fidelity Modeling of Computer Network Worms
modeling, such as using epidemic models, has been the general method of choice for understanding and analyzing the high-level effects of worms. However, high-fidelity models, such...
Kalyan S. Perumalla, Srikanth Sundaragopalan
GCC
2005
Springer
14 years 1 months ago
A Routing Protocol Based on Trust for MANETs
Abstract. Ad hoc network is a peer-to-peer grid system. The combination of the Knowledge Grid and ad hoc network could have a great effect on the future interconnection environment...
Cuirong Wang, Xiaozong Yang, Yuan Gao
TSMC
2008
133views more  TSMC 2008»
13 years 7 months ago
Trading With a Stock Chart Heuristic
Abstract--The efficient market hypothesis (EMH) is a cornerstone of financial economics. The EMH asserts that security prices fully reflect all available information and that the s...
William Leigh, Cheryl J. Frohlich, Steven Hornik, ...
IEEEARES
2006
IEEE
14 years 1 months ago
Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems
A P2P currency can be a powerful tool for promoting exchanges in a trusted way that make use of under-utilized resources both in computer networks and in real life. There are thre...
Kenji Saito, Eiichi Morino, Jun Murai