Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
A rechargeable battery may be used to partially protect the privacy of information contained in a household’s electrical load profile. We represent the system as a finite stat...
CODECRAWLER (in the remainder of the text CC) is a language independent, interactive, information visualization tool. It is mainly targeted at visualizing object-oriented software...
Harald Gall, Martin Pinzger, Michele Lanza, St&eac...
Information retrieval needs to match relevant texts with a given query. Selecting appropriate parts is useful when documents are long, and only portions are interesting to the user...
Bioinformatics research groups require information systems keeping track of experiments and their results. However, current solutions are often ad-hoc, difficult to maintain, exten...