Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
Methods are presented to increase resiliency to server failures by migrating long running, secure TCP-based connections to backup servers, thus mitigating damage from servers disa...
Contract and rights management – and thus property rights protection – has gained increasing importance as a quality standard in brokerage and electronic commerce environments...
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
As mobile phone becomes popular in the society and many people can afford the cost, the demand of mobility is extended to teaching and learning purposes. One recent and significan...