Showing 1 - 10 of 90
werden und die multiple Möglichkeiten besitzen, andere VCG im Netzwerk zu erreichen. Basierend auf den Analysen leitet der …) hold in their syndication network and determines the effect that network positions have on generating deal flow quantity … and quality. Network closure (Coleman 1988) emphasizes that cohesive network structures facilitate cooperative behavior of …
Persistent link: https://www.econbiz.de/10009467400
Prepared for a Conference on Transnational Networks in Princeton in 2001, this paper explored the comparative dynamics of the trans-local networks which South Asian migrants from Mirpur (Pakistan), Jullundur (India) and Sylhet (Bangladesh) have constructed around themselves.
Persistent link: https://www.econbiz.de/10009468661
Intrusion detection systems (IDSs) are important components of network security. However, it is well known that current …
Persistent link: https://www.econbiz.de/10009431185
firms in the supply chain. We study the impact of network security vulnerability and supply chain integration on firms …' incentives to invest in information security. We find that even though an increase in either the degree of network vulnerability … to invest in security. If the degree of supply chain integration is low, then an increase in network vulnerability …
Persistent link: https://www.econbiz.de/10009459121
cardholder data. The standard considers points such as policies design, data security, network architecture, software design …
Persistent link: https://www.econbiz.de/10009459180
victim, but also by all nodes in the network. Then, a stochastic packet forwarding game strategy was introduced. Our solution … results. Cooperation among ad hoc nodes can also protect a network from malicious attacks. In the absence of a central trusted … entity, many security mechanisms and privacy protections require cooperation among ad hoc nodes to protect a network from …
Persistent link: https://www.econbiz.de/10009460501
Internet worm attacks have become increasingly more frequent and have had a major impact on the economy, making the detection and prevention of these attacks a top security concern. Several countermeasures have been proposed and evaluated in recent literature. However, the eect of these proposed...
Persistent link: https://www.econbiz.de/10009475736
Internet-connected computers. They use this network of controlled computers to flood networks with traffic from multiple … a closed network and to rapidly implement new communication, spreading, control, and attack mechanisms for study. This …, and periodic updates.Our approach implements the key network features from existing botnets and provides the required …
Persistent link: https://www.econbiz.de/10009476126
degradation of the performance of the network or even disruption of its operation altogether. To mitigate the effect of such nodes … that is based on soft computing to establish quantifiable trust levels between the nodes of an ad-hoc network. The …
Persistent link: https://www.econbiz.de/10009481931
is different from traditional methods and examines deep inside the propagation procedure among nodes in the network by …
Persistent link: https://www.econbiz.de/10009483723