Organizations are under increasing pressures to manage all of the personal data concerning their customers and employees in a responsible manner. With the advancement of informatio...
Larry Korba, Ronggong Song, George Yee, Andrew S. ...
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
—We propose a formal model of web security based straction of the web platform and use this model to analyze the security of several sample web mechanisms and applications. We id...
Devdatta Akhawe, Adam Barth, Peifung E. Lam, John ...
We present a family of algorithms to uncover tribes--groups of individuals who share unusual sequences of affiliations. While much work inferring community structure describes lar...
Abstract. JeromeDL is a Semantic Digital Library engine. It uses Semantic Web and Social Networking technologies to improve browsing and searching for resources. With JeromeDL’s ...
Sebastian Ryszard Kruk, Tomasz Woroniecki, Adam Gz...