Implementation-level vulnerabilities are a persistent threat to the security of computing systems. We propose using the results of partially-successful verification attempts to pl...
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...
Current information protection systems only detect and warn against individual intrusion, and are not able to provide a collective and synthesized alert message. In this paper, we ...
Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Ji-Yeon Ch...
We address the problem of fairly distributing the cost of system-wide improvements to the security of a transportation infrastructure over the beneficiaries. We present a framework...