Files or even their names often contain confidential or secret information. Most users believe that such information is erased as soon as they delete a file. Even those who know...
Traditional storage systems have considered security as a problem to be solved at the perimeter: once a user is authenticated, each device internal to the system trusts the decisi...
Douglas Thain, Christopher Moretti, Paul Madrid, P...
Despite the importance of analytical tools to organizations, there are challenges that should be tackled in order to leverage the impact of those tools in the decision making proc...
Denilson Sell, Liliana Cabral, Enrico Motta, John ...
When reflecting on information, spatial hypermedia users express their understanding of the information’s structure visually. In order to facilitate this process, spatial hyperm...
In this work we develop an approach for anomaly detection for large scale networks such as that of an enterprize or an ISP. The traffic patterns we focus on for analysis are that...