Sciweavers

595 search results - page 49 / 119
» Survivability Analysis of Network Specifications
Sort
View
AAAI
2004
15 years 5 months ago
Agent-Based Modeling with Social Networks for Terrorist Recruitment
The Seldon model combines concepts from agent-based modeling and social network analysis to create a computation model of social dynamics for terrorist recruitment. The underlying...
Teresa H. Ko, Nina M. Berry
IJNM
2008
103views more  IJNM 2008»
15 years 4 months ago
An efficient architecture for Bandwidth Brokers in DiffServ networks
In this article we examine the architecture of an entity used for automatic management and provisioning of resources for DiffServ networks. We examine the existing literature and ...
Christos Bouras, Kostas Stamos
INFOCOM
2006
IEEE
15 years 10 months ago
Network Protocol System Fingerprinting - A Formal Approach
— Network protocol system fingerprinting has been recognized as an important issue and a major threat to network security. Prevalent works rely largely on human experiences and i...
Guoqiang Shu, David Lee
TVCG
2008
121views more  TVCG 2008»
15 years 3 months ago
On the Visualization of Social and other Scale-Free Networks
This paper proposes novel methods for visualizing specifically the large power-law graphs that arise in sociology and the sciences. In such cases a large portion of edges can be sh...
Yuntao Jia, Jared Hoberock, Michael Garland, John ...
IJNSEC
2008
110views more  IJNSEC 2008»
15 years 4 months ago
Security Measures and Weaknesses of the GPRS Security Architecture
This paper presents an evaluation of the security architecture employed in the General Packet Radio Services (GPRS). More specifically, the security measures applied to protect th...
Christos Xenakis