-
3
-
-
44549085439
-
-
T. Ptacek, T. Newsham, Insertion, evasion, and denial of service: eluding network intrusion detection. Available from: 7 (1).
-
T. Ptacek, T. Newsham, Insertion, evasion, and denial of service: eluding network intrusion detection. Available from: 7 (1).
-
-
-
-
4
-
-
1542288809
-
Game theoretic approach to decision and analysis in network intrusion detection
-
IEEE, Hawaii
-
Alpcan T., and Basar T. Game theoretic approach to decision and analysis in network intrusion detection. Proceedings of the 42nd IEEE CDC (2003), IEEE, Hawaii 2595-2600
-
(2003)
Proceedings of the 42nd IEEE CDC
, pp. 2595-2600
-
-
Alpcan, T.1
Basar, T.2
-
7
-
-
16644384919
-
Incentive-based modeling and inference of attacker intent, objectives, and strategies
-
Liu P., and Zang W. Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Trans. Inf. Syst. Secur. 8 1 (2005) 78-118
-
(2005)
ACM Trans. Inf. Syst. Secur.
, vol.8
, Issue.1
, pp. 78-118
-
-
Liu, P.1
Zang, W.2
-
8
-
-
0042474230
-
-
M. Kodialam, T.V. Lakshman, Detecting network intrusions via sampling: a game theoretic approach, in: Proceedings of the 22nd Annual Joint Conference of IEEE Computer and Communication Societies INFOCOM 2003, California, 2003.
-
M. Kodialam, T.V. Lakshman, Detecting network intrusions via sampling: a game theoretic approach, in: Proceedings of the 22nd Annual Joint Conference of IEEE Computer and Communication Societies INFOCOM 2003, California, 2003.
-
-
-
-
10
-
-
0037086890
-
Wireless sensor networks: a survey, Elsevier
-
Akyldiz I.F., Su W., Sankarasubramaniam Y., and Cayirci E. Wireless sensor networks: a survey, Elsevier. Comput. Netw. 38 4 (2002) 393-422
-
(2002)
Comput. Netw.
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyldiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
12
-
-
9644266731
-
-
V. Conitzer, T. Sandholm, Computing shapley values, manipulating value division schemes, and checking core membership in multi-issue domains, in: Proceedings of the AAAI, 2004, pp. 219-225.
-
V. Conitzer, T. Sandholm, Computing shapley values, manipulating value division schemes, and checking core membership in multi-issue domains, in: Proceedings of the AAAI, 2004, pp. 219-225.
-
-
-
-
13
-
-
0031176702
-
A simple min-cut algorithm
-
Stoer M., and Wagner F. A simple min-cut algorithm. J. ACM (JACM) 44 4 (1997) 585-591
-
(1997)
J. ACM (JACM)
, vol.44
, Issue.4
, pp. 585-591
-
-
Stoer, M.1
Wagner, F.2
-
14
-
-
44549088060
-
-
V. Sharma, F. Hellstrand, Framework for multi-protocol label switching (MPLS)-based recovery, RFC 3469, 2003.
-
V. Sharma, F. Hellstrand, Framework for multi-protocol label switching (MPLS)-based recovery, RFC 3469, 2003.
-
-
-
-
18
-
-
0003515463
-
-
Prentice Hall, N.J.
-
Ahuja R., Magnanti T., and Orlin J. Network Flows: Theory, Algorithms, and Applications (1993), Prentice Hall, N.J.
-
(1993)
Network Flows: Theory, Algorithms, and Applications
-
-
Ahuja, R.1
Magnanti, T.2
Orlin, J.3
|