We provide a survey on security features and threats to existing Instant Messaging (IM) networks and discuss how currently available systems fail to provide adequate security in l...
The goal of the semantic web is to facilitate the exchange of meaningful information in a form that is easy for machines to process. The goal of an e-learning system is to support ...
This paper investigates how human warmth and sociability (social presence) can be integrated through the Web interface to positively impact online trust. An empirical study was und...
Driven by the ubiquitous deployment of mobile systems, the widespread use of the Internet, the rapid advances in wireless technologies, the insatiable demand for high-speed interac...
In this paper we present a new approach to stateful intrusion detection. It is based on a temporal logic which has the capability to express temporary properties, which are propert...
Along with the growth of information technology, online gaming has become a very successful and outstanding industry, especially in Asia. However due to the lack of legal regulatio...
Ying-Chieh Chen, Patrick S. Chen, Ronggong Song, L...
We examine the problem of determining a user's value for his/her private information. Web businesses often offer rewards, such as discounts, free downloads and website persona...
Scott Buffett, Nathan Scott, Bruce Spencer, Michae...
Signature-based malicious code detection is the standard technique in all commercial anti-virus software. This method can detect a virus only after the virus has appeared and cause...
Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray...