— We present the design of a Network Forensic Alliance (NFA), to allow multiple administrative domains (ADs) to jointly locate the origin of epidemic spreading attacks. ADs in th...
Yinglian Xie, Vyas Sekar, Michael K. Reiter, Hui Z...
We are witnessing the emergence of the global, dependable and efficient infrastructure of cloud computing. We assess the current state of the Enterprise Knowledge Management field...
Advances in data collection and storage capacity have made it increasingly possible to collect highly volatile graph data for analysis. Existing graph analysis techniques are not ...
Keith Henderson, Tina Eliassi-Rad, Christos Falout...
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Manual reconstruction of ripped-up documents can be a very difficult and time-consuming task. This paper discusses a semi-automatic toolset that can be used for reconstructing rip...