1 On the Internet, digitally active small and medium sized enterprises (SME) face numerous security risks. When SMEs join networks, business ideas and malicious activities may inte...
The constant expansion of the World Wide Web allows users to enjoy a wide range of products and services delivered directly to their browsers. At the same time however, this expans...
Nick Nikiforakis, Steven Van Acker, Frank Piessens...
This paper presents a novel architecture that brings together Information Extraction (IE) with Event Processing (EP) research areas to globally monitor human activities and biodive...
Ahmed Abdeen Hamed, Byung Suk Lee, Anne E. Thessen
To detect and investigate self-propagating worm attacks against networked servers, the following capabilities are desirable: (1) raising timely alerts to trigger a worm investigat...
Xuxian Jiang, Florian P. Buchholz, Aaron Walters, ...
We address the problem of minimizing the propagation of undesirable things, such as computer viruses or malicious rumors, by blocking a limited number of links in a network, a dua...