Sciweavers

1737 search results - page 43 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
TMC
2011
164views more  TMC 2011»
13 years 4 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
IDEAL
2004
Springer
14 years 2 months ago
Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning
As a vast number of services have been flooding into the Internet, it is more likely for the Internet resources to be exposed to various hacking activities such as Code Red and SQL...
Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi...
SUTC
2010
IEEE
14 years 29 days ago
Data Caching in Ad Hoc Networks Using Game-Theoretic Analysis
— Extensive research has been performed to study selfish data caching in ad hoc networks using game-theoretic analysis. However, due to the caching problem’s theoretical root ...
Yutian Chen, Bin Tang
HYBRID
2009
Springer
14 years 3 months ago
Safe and Secure Networked Control Systems under Denial-of-Service Attacks
Abstract. We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over ...
Saurabh Amin, Alvaro A. Cárdenas, Shankar S...
GECCO
2008
Springer
116views Optimization» more  GECCO 2008»
13 years 10 months ago
Stock trading strategies by genetic network programming with flag nodes
Genetic Network Programming (GNP) has been proposed as a graph-based evolutionary algorithm. GNP works well especially in dynamic environments due to its graph structures. In addi...
Shingo Mabu, Yan Chen, Etsushi Ohkawa, Kotaro Hira...