Search Results

There are 14306 results for: content related to: Modeling and security analysis of enterprise network using attack–defense stochastic game Petri nets

  1. Security analysis of online digital goods business based on stochastic game net model

    Security and Communication Networks

    Volume 9, Issue 7, 10 May 2016, Pages: 587–598, Junjie Lv and Chen Zhao

    Article first published online : 9 DEC 2015, DOI: 10.1002/sec.1381

  2. An improved approximation algorithm for the capacitated TSP with pickup and delivery on a tree


    Volume 63, Issue 2, March 2014, Pages: 179–195, Zhou Xu, Xiaofan Lai, Andrew Lim and Fan Wang

    Article first published online : 7 OCT 2013, DOI: 10.1002/net.21535

  3. Mantel's theorem for random graphs

    Random Structures & Algorithms

    Volume 47, Issue 1, August 2015, Pages: 59–72, B. DeMarco and J. Kahn

    Article first published online : 28 MAR 2014, DOI: 10.1002/rsa.20535

  4. Robust containment control in a leader–follower network of uncertain Euler–Lagrange systems

    International Journal of Robust and Nonlinear Control

    Justin R. Klotz, Teng-Hu Cheng and Warren E. Dixon

    Article first published online : 7 MAR 2016, DOI: 10.1002/rnc.3535

  5. When Does a Retailer's Advance Selling Capability Benefit Manufacturer, Retailer, or Both?

    Production and Operations Management

    Xuying Zhao, Zhan Pang and Kathryn E. Stecke

    Article first published online : 12 FEB 2016, DOI: 10.1111/poms.12535

  6. Pseudomorphic ZnO-based heterostructures: From polar through all semipolar to nonpolar orientations

    physica status solidi (b)

    Volume 253, Issue 2, February 2016, Pages: 351–360, Marius Grundmann and Jesús Zúñiga-Pérez

    Article first published online : 12 OCT 2015, DOI: 10.1002/pssb.201552535

  7. New scaling model for variables and increments with heavy-tailed distributions

    Water Resources Research

    Volume 51, Issue 6, June 2015, Pages: 4623–4634, Monica Riva, Shlomo P. Neuman and Alberto Guadagnini

    Article first published online : 26 JUN 2015, DOI: 10.1002/2015WR016998

  8. An asymptotic model for a thin, soft and imperfectly bonded elastic joint

    Mathematical Methods in the Applied Sciences

    Volume 39, Issue 5, April 2016, Pages: 981–997, Christian Licht, Gérard Michaille and Pongpol Juntharee

    Article first published online : 21 DEC 2015, DOI: 10.1002/mma.3535

  9. Robust Data Fusion of Multimodal Sensory Information for Mobile Robots

    Journal of Field Robotics

    Volume 32, Issue 4, June 2015, Pages: 447–473, Vladimír Kubelka, Lorenz Oswald, François Pomerleau, Francis Colas, Tomáš Svoboda and Michal Reinstein

    Article first published online : 6 AUG 2014, DOI: 10.1002/rob.21535

  10. A new Beale–Kato–Majda criteria for the 3D magneto-micropolar fluid equations in the Orlicz–Morrey space

    Mathematical Methods in the Applied Sciences

    Volume 35, Issue 11, 30 July 2012, Pages: 1321–1334, Sadek Gala, Yoshihiro Sawano and Hitoshi Tanaka

    Article first published online : 24 MAY 2012, DOI: 10.1002/mma.2535

  11. Vulnerability-constrained multiple minimum cost paths for multi-source wireless sensor networks

    Security and Communication Networks

    Wei An, Song Ci, Haiyan Luo, Yanni Han, Tao Lin, Ding Tang and Ying Qi

    Article first published online : 16 JAN 2014, DOI: 10.1002/sec.932

  12. A stochastic game net-based model for effective decision-making in smart environments

    Concurrency and Computation: Practice and Experience

    Rajinder Sandhu and Sandeep K. Sood

    Article first published online : 27 APR 2016, DOI: 10.1002/cpe.3843

  13. Global nonexistence for an integro-differential equation

    Mathematical Methods in the Applied Sciences

    Volume 35, Issue 1, 15 January 2012, Pages: 72–83, Shun-Tang Wu and Ching-Yan Lin

    Article first published online : 29 DEC 2011, DOI: 10.1002/mma.1535

  14. Attack modelling and security evaluation based on stochastic activity networks

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 714–737, Ali Sedaghatbaf and Mohammad Abdollahi Azgomi

    Article first published online : 26 APR 2013, DOI: 10.1002/sec.774

  15. LMI stability conditions for uncertain rational nonlinear systems

    International Journal of Robust and Nonlinear Control

    Volume 24, Issue 18, December 2014, Pages: 3124–3169, A. Trofino and T.J.M. Dezuo

    Article first published online : 15 JUL 2013, DOI: 10.1002/rnc.3047

  16. Analyzing multiple cross-sectional samples with application to hospitalization time after surgeries

    Statistics in Medicine

    Volume 34, Issue 26, 20 November 2015, Pages: 3415–3423, Micha Mandel

    Article first published online : 13 MAY 2015, DOI: 10.1002/sim.6535

  17. Trust computation for multiple routes recommendation in social network sites

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2258–2276, Bo Zhang, Zhenhua Huang, Jian Yu and Yang Xiang

    Article first published online : 10 JAN 2014, DOI: 10.1002/sec.935

  18. Probabilistic analyses of soil consolidation by prefabricated vertical drains for single-drain and multi-drain systems

    International Journal for Numerical and Analytical Methods in Geomechanics

    Mohammad Wasiul Bari, Mohamed A. Shahin and Abdul-Hamid Soubra

    Article first published online : 3 MAY 2016, DOI: 10.1002/nag.2535

  19. Multiscale convection in a geodynamo simulation with uniform heat flux along the outer boundary

    Geochemistry, Geophysics, Geosystems

    Volume 15, Issue 8, August 2014, Pages: 3212–3225, Hiroaki Matsui, Eric King and Bruce Buffett

    Article first published online : 19 AUG 2014, DOI: 10.1002/2014GC005432

  20. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Article first published online : 19 JUN 2012, DOI: 10.1002/sec.542