Zobrazeno 1 - 10
of 69
pro vyhledávání: '"Pasquale Malacaria"'
Publikováno v:
Entropy, Vol 24, Iss 1, p 39 (2021)
This work introduces channel-supermodular entropies, a subset of quasi-concave entropies. Channel-supermodularity is a property shared by some of the most commonly used entropies in the literature, including Arimoto–Rényi conditional entropies (wh
Externí odkaz:
https://doaj.org/article/be33d12663c54dfca3e56c2c67a76225
Autor:
MHR Khouzani, Pasquale Malacaria
Publikováno v:
Entropy, Vol 20, Iss 11, p 817 (2018)
Information theory, as the mathematics of communication and storage of information, and game theory, as the mathematics of adversarial and cooperative strategic behaviour, are each successful fields of research on their own. [...]
Externí odkaz:
https://doaj.org/article/a272d6c3cafe44fe8b7b6b5d92388af9
Autor:
MHR. Khouzani, Pasquale Malacaria
Publikováno v:
Entropy, Vol 20, Iss 9, p 675 (2018)
This paper studies the problem of optimal channel design. For a given input probability distribution and for hard and soft design constraints, the aim here is to design a (probabilistic) channel whose output leaks minimally from its input. To analyse
Externí odkaz:
https://doaj.org/article/d41550ca46b74d1ba81d2ada436c9679
Autor:
Han Chen, Pasquale Malacaria
Publikováno v:
Electronic Proceedings in Theoretical Computer Science, Vol 7, Iss Proc. SECCO 2009, Pp 1-15 (2009)
When studying the information leakage in programs or protocols, a natural question arises: "what is the worst case scenario?". This problem of identifying the maximal leakage can be seen as a channel capacity problem in the information theoretical se
Externí odkaz:
https://doaj.org/article/967e62d243494f5e9cc5ece1d5974156
Autor:
Yunxiao Zhang, Pasquale Malacaria
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:2365-2383
Publikováno v:
Computers & Security. 130:103250
Publikováno v:
IEEE Transactions on Information Theory. 66:5537-5547
This work presents an axiomatization for entropy based on an extension of concavity called core-concavity. We show that core-concavity characterizes the largest class of functions for which the data-processing inequality holds, under the assumption t
CySecTool is a tool that finds a cost-optimal security controls portfolio in a given budget for a probabilistic attack graph. A portfolio is a set of counter-measures, or controls, against vulnerabilities adopted for a computer system, while an attac
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::aef362b8669c36e09300a8c58ebe2e60
Publikováno v:
Computers & Security. 123:102938
Publikováno v:
Computers & Security. 122:102865