With the growth and acceptance of the Internet, there has been increased interest in maintaining anonymity in the network. Using traffic analysis, it is possible to infer who is t...
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
This paper presents an FPGA-friendly approach to tracking elephant flows in network traffic. Our approach, Single Step Segmented Least Recently Used (S3 -LRU) policy, is a netwo...
Governments have developed policies and strategies which are designed to assist SMEs to become eenabled. It is not clear what impact these strategies have on SMEs. There is some e...
: Strategic Simulation Games have become an important element of policy development in the context of Critical Infrastructure Protection (CIP). They foster the network between all ...