Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
We present a method for testing subject’s performance in a realistic (end-to-end) information understanding task— rapid understanding of large document collections—and discu...
In recent years, the standards community has developed techniques for traversing NAT/firewall boxes with UDP (that is, establishing UDP flows between hosts behind NATs). Because...
Software comprehension (understanding software structure and behavior) is essential for developing, maintaining, and improving software. This is particularly true of agent-based s...
Since TCP is considered unsuitable for the majority of the emerging multimedia applications, these applications primarily use UDP transport together with proprietary congestion co...