In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
We consider applications of probabilistic techniques in the framework of algorithmic game theory. We focus on three distinct case studies: (i) The exploitation of the probabilistic...
Questions that require answers in the form of a list of entities and the identification of diverse biological entity classes present an interesting challenge that required new app...
Luis Tari, Phan Huy Tu, Barry Lumpkin, Robert Leam...