Now showing items 34-36 of 112

    • The problem isn't attribution: It's multi-stage attacks 

      Clark, David D.; Landau, Susan (© Association for Computing Machinery, New York, NY, USA, 2010-11-30)
      As a result of increasing spam, DDoS attacks, cybercrime, and data exfiltration from corporate and government sites, there have been multiple calls for an Internet architecture that enables better network attribution at ...
    • Mechanism design with set-theoretic beliefs 

      Chen, Jing; Micali, Silvio (© IEEE, 2011-10-22)
      In settings of incomplete information, we put forward (1) a very conservative -- indeed, purely set-theoretic -- model of the beliefs (including totally wrong ones) that each player may have about the payoff types of his ...
    • The evolution of network based cybersecurity norms: An analytical narrative 

      Basuchoudhary, Atin; Choucri, Nazli (© IEEE, 2014-08-13)
      We examine coordination dilemmas in cybersecurity policy by using an already developed evolutionary game theoretical model [2]. We suggest that norms to encourage network based security systems may not evolve independently ...