Although Regular Expressions (RegExes) have been widely used in network security applications, their inherent complexity often limits the total number of RegExes that can be detec...
Abstract. We propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection in unlabeled audit data streams. The framework owns a...
— Accurately positioning nodes in wireless and sensor networks is important because the location of sensors is a critical input to many higher-level networking tasks. However, th...
In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multihop routes to the destination node. Due to the lack of infrastr...
Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, ...
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classification scheme exploiting the social communication ...