—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
—Femtocells have been considered by the wireless industry as a promising solution not only to improve indoor coverage, but also to unload traffic from already overburdened macroc...
Abstract—Tor is a well-known low-latency anonymous communication system. To prevent the traffic analysis attack, Tor packs application data into equal-sized cells. However, we f...
—To cope with the tremendous variations of writing styles encountered between different individuals, unconstrained automatic handwriting recognition systems need to be trained on...
Volkmar Frinken, Andreas Fischer, Horst Bunke, Ali...
Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of ...
Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anh...