Abstract. Traditional recovery mechanisms are not adequate in protecting databases from malicious attacks. A malicious transaction by virtue of writing on to the database can corru...
Indrakshi Ray, Ross M. McConnell, Monte Lunacek, V...
A reparable database management system has the ability to automatically undo the set of transactions that are corrupted by a human error or malicious attack. The key technical chal...
We propose a robust and imperceptible spectral watermarking method for high rate embedding of a watermark into 3D polygonal meshes. Our approach consists of four main steps: (1) t...
Emad E. Abdallah, A. Ben Hamza, Prabir Bhattachary...
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Abstract--Packet Level Authentication (PLA) is a novel countermeasure against distributed denial-of-service attacks. Each packet sent across a network has a digital signature and p...