Now showing items 1-4 of 4
Extracting Information about Security Vulnerabilities from Web Text
The Web is an important source of information about computer security threats, vulnerabilities and cyber-attacks. We present initial work on developing a framework to detect and extract information about vulnerabilities ...
CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies
A Cyber-Physical System (CPS) involves a tight coupling between the physical and computational elements. Security is a key challenge for the deployment of CPS. Therefore, it is highly desirable to extract correct information ...
SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks
Mobile Ad-hoc Networks (MANETs) are extremely vulnerable to a variety of misbehaviors because of their basic features, including lack of communication infrastructure, short transmission range, and dynamic network topology. ...
ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine
Mobile Ad-hoc NETworks (MANETs) are extremely susceptible to various misbehaviors and a variety of trust management schemes have been proposed to detect and mitigate them. Most schemes rely on a set of pre-defined weights ...