Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...
The deployment of Next-Generation Networks (NGN) is a challenge that requires integrating heterogeneous services into a global system of All-IP telecommunications. These networks c...
Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia B...
Salmonella is among the most common food borne illnesses which may result from consumption of contaminated products. In this paper we model the co-occurrence data between USDA-cont...
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Despite several research studies, the effective analysis of policy based systems remains a significant challenge. Policy analysis should at least (i) be expressive (ii) take accou...
Robert Craven, Jorge Lobo, Jiefei Ma, Alessandra R...