As more and more e-retailers promise their customers that online experiences will be satisfying ones, understanding what creates a satisfying customer experience becomes crucial. ...
It is sometimes desirable to allow access to open ports on a firewall only to authorized external users and present closed ports to all others. We examine ways to construct an au...
Rennie deGraaf, John Aycock, Michael J. Jacobson J...
Efforts to defend against automated attacks on e-commerce services have led to a new security protocol known as a CAPTCHA, a challenge designed to exploit gaps in the perceptual a...
Computational Scientists often cannot easily access the large amounts of resources their applications require. Legion is a collection of software services that facilitate the secur...
Anand Natrajan, Marty Humphrey, Andrew S. Grimshaw
Reflector attacks are a variant of denial-of-service attacks that use unwitting, legitimate servers to flood a target. The attacker spoofs the target's address in legitimate s...
Erik Kline, Matt Beaumont-Gay, Jelena Mirkovic, Pe...