by E.O. Ibidunmoye, B.K. Alese and O.S. Ogundele
Original Research
Game-theoretic modeling of computer security views security attack scenarios as an optimization game comprising of multiple players notably the attackers and the defenders (system administrators). This paper first presents theoretically, a two-player zero-sum stochastic game model of the interaction between malicious users and network administrators and secondly introduces a hypothetical network of a typical scenario to show the applicability of our model within that scenario. State games are encoded using a binary scheme in order to properly capture components of the underlying network environment. Our solution involves reducing each state game into a min and max linear programming problems for both the defender and attacker respectively. Game costs, rewards and outcomes are modeled to closely match real world measurements. We propose the use of a combination of the pivotal algorithm and a custom stochastic algorithm to compute the optimal (best-response) strategies for the players at each state. We also describe how the results can be analyzed to show how the optimal strategies can be used by the network administrators to predict adversary's actions, determine vulnerable network assets and suggest optimal defense strategies.black women white men
maxcook.com married woman looking to cheat
erotic preteen sex stories
site adult teacher anal sex stories
adult breastfeeding stories
click mom sex stories
tracking app for android
go free spyware app
lesbian sex stories
site mom sex stories
discount prescription drug cards
click cialis prescription coupon
free prescription cards discount
site coupon for free cialis
bystolic discount coupon
bystolic coupon 2014
Journal of Computer Sciences and Applications. 2013, 1(2), 27-32. DOI: 10.12691/jcsa-1-2-3
Pub. Date: April 24, 2013
18925 Views6466 Downloads34 Likes4 Citations
by Vahe Khachaturyan
Review Article
An off-line signature verification system attempts to authenticate the identity of an individual by examining his/her handwritten signature, after it has been successfully extracted from, for example, a cheek, a debit or credit card transaction slip, or any other legal document. In this paper a novel off-line signature verification system selecting 120 feature points from the geometric center of the signature and compares them with the already trained feature points.azithromycin pill
link viagra 130mg
discount prescription coupons
read discount prescription drug card
viagra coupons printable
click prescriptions coupons
coupons for prescription drugs
drug coupon cialis coupon free
pet prescription discount card
link lilly cialis coupon
abortion debate
fyter.cn what is the abortion pill
bystolic generic name
what is the generic for bystolic
low blood sugar
blood sugar control
Journal of Computer Sciences and Applications. 2013, 1(2), 23-26. DOI: 10.12691/jcsa-1-2-2
Pub. Date: April 30, 2013
19037 Views6042 Downloads34 Likes1 Citations
by Ghaida Rebdawi, Said Desouki and Nada Ghneim
Original Research
Dictionaries are very essential resources that almost all Natural Language Processing (NLP) applications use. Since language is constantly evolving, new words or new meanings to current words continuously appear. In order to keep a dictionary up-to-date, an enrichment process is needed to incorporate new vocabularies. In the last decade, a new approach of resources construction has emerged based on the collaboration between different users on the Web. In this paper, we present the Interactive Arabic Dictionary (IAD): a monolingual web-based dictionary. Initially based on the “Almuajam Alwasseet” dictionary, IAD provides the different meanings of Arabic words, with specific morphological and syntactical information, in addition to other related information such as example sentences, multimedia illustrations, associated words, semantic domains, expressions, linguistic avails, common mistakes. Authorized users can collaboratively enrich the content of the dictionary through the use of a “controlled process” to add or modify entries, meanings, or any kind of detailed information related to them. This “controlled process” consists of a suggestion-validation procedure in order to maintain the integrity of the dictionary. This enrichment process will expand the dictionary content, allowing its future exploitation in high level NLP applications.why do men cheat on their girlfriends
link i had a dream my girlfriend cheated on me
adult fetish stories
click indian sex stories
lesbian sex stories
site mom sex stories
zovirax
site levofloxacin 500mg
prescription discount codes
site viagra free coupon
discount prescription drug cards
open cialis prescription coupon
abortion debate
fyter.cn what is the abortion pill
avodart buy uk
go avodart buy uk
Journal of Computer Sciences and Applications. 2013, 1(2), 17-22. DOI: 10.12691/jcsa-1-2-1
Pub. Date: April 24, 2013
23645 Views9371 Downloads34 Likes1 Citations