Computational web portals provide uniform access to remote computational resources--hardware, software, and data--by hiding the complexity of the heterogeneous, distributed, high ...
Security is an important element of any system design. Entities supported by a system need to securely interact with each other. The problem gets even more complex in the context ...
Yan Yan, Yi Huang, Geoffrey Fox, Shrideep Pallicka...
: Web servers dominate our view of the Web today. Security provided by them has been implemented with varying degrees of success. Web servers are frequently successfully attacked, ...
Automated rule induction procedures like machine learning and statistical techniques result in rules that lack generalization and maintainability. Developing rules manually throug...
This paper reports our experiences with identifying cyber-based threats to the survivability of power substation control networks. Observations from the initial application of vul...
Abstract The uncontrolled propagation of faults due to malicious intrusion can severely decrease system performance and survivability. Our goal is to employ available information a...
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
This paper proposes a technique to foil DoS (Denial of Service) attacks. The proposed technique converts a static service to a relocating service and provides information of the n...