In today's hi-tech world, conventional physical security methods are simply insufficient for the protection of an organisation's information assets. This is because of t...
Standard "new-Reno" TCP faces some performance limitations in very high throughput IP WAN networks, (e.g., computing grids) due to a long end-to-end congestion feedback l...
Privacy is a huge problem for users of social networking sites. While sites like Facebook allow individual users to personalize fine-grained privacy settings, this has proven quit...
Lujun Fang, Heedo Kim, Kristen LeFevre, Aaron Tami
Mobility-pricing is one of the avenues leading to the information highway. Using a combination of positioning, communication and information processing, automobile insurance can b...
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...