One of the growing problems faced by network administrators is the abuse of computing resources by authorized and unauthorized personnel. The nature of abuse may vary from using u...
Kulesh Shanmugasundaram, Mehdi Kharrazi, Nasir D. ...
While it provides the unprecedented processing power to solve many large scale computational problems, GRID, if abused, has the potential to easily be used to launch (for instance...
Internet blogs provide forums for discussions within virtual communities, allowing readers to post comments on what they read. However, such comments may contain abuse, such as pe...
Recent studies by agriculture researchers in Pakistan have shown that attempts of crop yield maximization through pro-pesticide state policies have led to a dangerously high pesti...
This paper describes an extension to abuse-casebased security requirements analysis that provides a lightweight means of increasing assurance in security relevant software. The ap...