In virtual machine environments each application is often run in its own virtual machine (VM), isolating it from other applications running on the same physical machine. Contentio...
Justin Cappos, Scott M. Baker, Jeremy Plichta, Duy...
Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...
: Children's privacy has become critical with the increasing use of the Internet for commercial purposes and corresponding increase in requests for information. 65% of childre...
Karthik Channakeshava, Kaigui Bian, Michael S. Hsi...
Embedded Peer-to-Peer Systems (EP2P) represent a new challenge in the development of software for distributed systems. The main objective of the SMEPP (Secure Middleware for Embed...
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...