— We treat the problem of large-scale TCP poisoning: an attacker, who is able to monitor TCP packet headers in the network, can deny service to all flows traversing the monitori...
In clinical applications where structural asymmetries between homologous shapes have been correlated with pathology, the questions of definition and quantification of ‘asymmetr...
Nicholas A. Lord, Jeffrey Ho, Baba C. Vemuri, Step...
New accreditation requirements focus on education as a “continuous improvement process.” The most important part of such a process is that information gets fed back into the s...
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
We have developed a computational framework to characterize social network dynamics in the blogosphere at individual, group and community levels. Such characterization could be us...
Munmun De Choudhury, Hari Sundaram, Ajita John, Do...