Systems are attempting to detect botnets by examining traffic content for IRC commands or by setting up honeynets. Our approach for detecting botnets is to examine flow characteri...
W. Timothy Strayer, Robert Walsh, Carl Livadas, Da...
This paper traces the ten plus year history of the Naval Research Laboratory’s Pump idea. The Pump was theorized, designed, and built at the Naval Research Laboratory’s Center...
Myong H. Kang, Ira S. Moskowitz, Stanley Chincheck
With powerful computer and mighty software, seasoned users could turn digital media into what they want. The detection of digital tampering has become a crucial problem. In most o...
When creating a digital composite of, for example, two people standing side-by-side, it is often difficult to match the lighting conditions from the individual photographs. Lighti...
Today's computer supported modelling environments could provide much more information about the users’ actions and problem solving processes than they usually store for late...