In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...
The availability of object middleware, such as CORBA, is rapidly being accepted as a means for cost effective and fast development for a wide range of distributed applications. Dis...
Maarten Wegdam, Dirk-Jaap Plas, Aart van Halteren,...
In this paper we present a method of computing the posterior probability of conditional independence of two or more continuous variables from data, examined at several resolutions...
— We explore the price dynamics in a competitive market consisting of spectrum agile network service providers and users. Here, multiple self interested spectrum providers operat...
Yiping Xing, Rajarathnam Chandramouli, Carlos de M...
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...