Ubiquitous application software usually has multiple QoS requirements, such as situationawareness, real-time, and security, which make the application software development complic...
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
In this paper, we present a new approach for safe execution of untrusted programs by isolating their effects from the rest of the system. Isolation is achieved by intercepting fi...
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Today's online social networking (OSN) sites do little to protect the privacy of their users' social networking information. Given the highly sensitive nature of the inf...
Amin Tootoonchian, Stefan Saroiu, Yashar Ganjali, ...