Sciweavers

1737 search results - page 34 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
INFOCOM
2008
IEEE
14 years 2 months ago
Competitive Analysis of Opportunistic Spectrum Access Strategies
—We consider opportunistic spectrum access (OSA) strategies for a transmitter in a multichannel wireless system, where a channel may or may not be available and the transmitter m...
Nicholas B. Chang, Mingyan Liu
BMCBI
2010
154views more  BMCBI 2010»
13 years 8 months ago
Candidate gene prioritization by network analysis of differential expression using machine learning approaches
Background: Discovering novel disease genes is still challenging for diseases for which no prior knowledge - such as known disease genes or disease-related pathways - is available...
Daniela Nitsch, Joana P. Gonçalves, Fabian ...
WISEC
2010
ACM
14 years 20 days ago
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks
In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with...
Qi Mi, John A. Stankovic, Radu Stoleru
INFOCOM
2005
IEEE
14 years 1 months ago
The effect of DNS delays on worm propagation in an IPv6 Internet
— It is a commonly held belief that IPv6 provides greater security against random-scanning worms by virtue of a very sparse address space. We show that an intelligent worm can ex...
Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos ...
CCS
2009
ACM
13 years 12 months ago
The bayesian traffic analysis of mix networks
This work casts the traffic analysis of anonymity systems, and in particular mix networks, in the context of Bayesian inference. A generative probabilistic model of mix network ar...
Carmela Troncoso, George Danezis