Adversary model

Results: 85



#Item
61Security / Intrusion detection system / Advanced persistent threat / Network intrusion detection system / Threat / Zero-day attack / Adversary model / Computer network security / Cyberwarfare / Computer security

Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains Eric M. Hutchins∗, Michael J. Cloppert†, Rohan M. Amin, Ph.D.‡ Lockheed Martin Corporation

Add to Reading List

Source URL: papers.rohanamin.com

Language: English - Date: 2011-08-10 17:29:42
62Computer science / Computing / Virtual memory / Cache / Page replacement algorithm / Cache-oblivious algorithm / Paging / Competitive analysis / Adversary model / Analysis of algorithms / Online algorithms / Computer memory

The Worst Page-Replacement Policy Kunal Agrawal1 , Michael A. Bender2 , and Jeremy T. Fineman1 1 2

Add to Reading List

Source URL: supertech.csail.mit.edu

Language: English - Date: 2014-09-16 08:27:49
63Statistics / Minimax / Loss function / Regret / Adversary model / Machine learning / Algorithm / Minimax estimator / Decision theory / Mathematics / Applied mathematics

Towards Minimax Online Learning with Unknown Time Horizon Haipeng Luo Department of Computer Science, Princeton University, Princeton, NJ[removed]HAIPENGL @ CS . PRINCETON . EDU

Add to Reading List

Source URL: jmlr.org

Language: English - Date: 2014-02-16 19:30:21
64Sybil attack / Denial-of-service attack / Adversary model / Adversary / Scalability / Electronic voting / System software / Distributed computing / Computing / LOCKSS / Peer-to-peer

1 Impeding Attrition Attacks in P2P Systems Petros Maniatis TJ Giuli

Add to Reading List

Source URL: lockss.org

Language: English - Date: 2011-01-02 18:55:49
65Computing / Internet / Degree of anonymity / Ciphertext indistinguishability / Anonymity / Onion routing / Tor / Differential privacy / Adversary model / Internet privacy / Cryptography / Cryptographic software

(Nothing else) MATor(s): Monitoring the Anonymity of Tor’s Path Selection Michael Backes1,2 Aniket Kate1,3

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-08-14 06:53:59
66Mathematical sciences / Applied mathematics / Analysis of algorithms / Online algorithms / Bayesian statistics / Stackelberg competition / Adversary model / Milind Tambe / Bayesian game / Game theory / Statistics / Operations research

Microsoft Word - B-14-Tambe, Ordonez.doc

Add to Reading List

Source URL: www.usc.edu

Language: English - Date: 2008-05-28 06:23:49
67Denial-of-service attacks / Security / Spamming / Computer worms / Operations security / Adversary model / Denial-of-service attack / Vulnerability / Email spam / Cyberwarfare / Computer security / Computer network security

Notes On The Design Of An Internet Adversary David S. H. Rosenthal1 , Petros Maniatis2 , Mema Roussopoulos3 , TJ Giuli4 , and Mary Baker5 1 4

Add to Reading List

Source URL: lockss.org

Language: English - Date: 2011-05-12 16:55:10
68Adversary model / Analysis of algorithms / Differential geometry

Online Geometric Optimization in the Bandit Setting Against an Adaptive Adversary H. Brendan McMahan and Avrim Blum Carnegie Mellon University, Pittsburgh, PA, 15213, mcmahan,avrim @cs.cmu.edu

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-04-05 15:49:32
69Civil procedure / Government / Notice of electronic filing / Email / Adversary proceeding in bankruptcy / Lawsuit / CM/ECF / Service of process / United States Postal Service / Law / Judicial branch of the United States government / Legal documents

Microsoft Word - Model Order re PTS[removed]doc

Add to Reading List

Source URL: www.cacb.uscourts.gov

Language: English - Date: 2014-05-23 14:54:50
70Mathematics / Applied mathematics / Adversary model / Algorithm / Resource allocation / Adversary / Genetic algorithm / Analysis of algorithms / Online algorithms / Management

CALIFORNIA STATE SCIENCE FAIR 2014 PROJECT SUMMARY Name(s) Project Number

Add to Reading List

Source URL: www.usc.edu

Language: English - Date: 2014-04-25 17:14:54
UPDATE