Over the last decade, studies of management fashions have shown that the rise and fall of the fashions can be seen as a reflection of a knowledge enterprise, where knowledge of ne...
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Beginning to create the New Oxford English Dictionary database has resulted in the realization that databases for reference texts are unlike those for conventional enterprises. Wh...
The growing number of Web Services technologies and their use have revolutionized the web. Web Services will play an important role in the next web generation (i.e. Semantic Web) ...
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...