— Currently, Denial of Service (DoS) attacks remain amongst the most critical threats to Internet applications. The goal of the attacker in a DoS attack is to overwhelm a shared ...
Abstract. In the escalating arms race between malicious code and security tools designed to analyze it, detect it or mitigate its impact, malicious code running inside the operatin...
Matthias Neugschwandtner, Christian Platzer, Paolo...
We consider a hierarchical multicellular sensing and communication network, embedded in an ageless aerospace vehicle, that is expected to detect and react to multiple impacts and d...
Mikhail Prokopenko, Peter Wang, Philip Valencia, D...
In recent years, opinion mining attracted a great deal of research attention. However, limited work has been done on detecting opinion spam (or fake reviews). The problem is analo...
This paper shows how a corpus of instant messages can be employed to detect de facto communities of practice automatically. A novel algorithm based on the concept of Edge Stress F...