Worms are arguably the most serious security threat facing the Internet. Seeking a detection technique that is both sufficiently efficient and accurate to enable automatic conta...
David Whyte, Evangelos Kranakis, Paul C. van Oorsc...
In the past few years the security issues in the supervisory control and data acquisition (SCADA) system have been investigated, and many security mechanisms have been proposed fro...
Success and sustainability of social networking sites is highly dependent on user participation. To encourage contribution to an opt-in social networking site designed for employe...
Rosta Farzan, Joan Morris DiMicco, David R. Millen...
Multihoming has traditionally been employed by stub networks to enhance the reliability of their network connectivity. With the advent of commercial “intelligent route control...
Aditya Akella, Bruce M. Maggs, Srinivasan Seshan, ...
- Poor data in information systems impede the quality of decision-making in many modern organizations. Manual business process activities and application services are never execute...