We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...
Non-intrusive appliance load monitoring is the process of disaggregating a household’s total electricity consumption into its contributing appliances. In this paper we propose a...
Oliver Parson, Siddhartha Ghosh, Mark Weal, Alex R...
Regularity extraction is an important step in the design ow of datapath-dominated circuits. This paper outlines a new method that automatically extracts regular structures from th...
Image dissimilarity measure is a hot topic. The measure process is generally composed of an information mining in each image which results in an image signature and then a signatu...
We analyze a secure routing protocol, Secure Path Vector (SPV), proposed in SIGCOMM 2004. SPV aims to provide authenticity for route announcements in the Border Gateway Protocol (...