Traditional Data Mining and Knowledge Discovery algorithms assume free access to data, either at a centralized location or in federated form. Increasingly, privacy and security co...
Abstract. The goal of Steganographic File Systems (SFSs) is to protect users from coercion attacks by providing plausible deniability on the existence of hidden files. We consider ...
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
Although, most of phenomena change over time, there has been an attempt to model the phenomena of real world assuming a static nature for them. Even when changes occurred in the p...
Effective hospital capacity planning can not only significantly enhance the capability and effectiveness of the treatment provided to patients during a bioterrorist attack but can...