C applications, in particular those using operating system level services, frequently comprise multiple crosscutting concerns: network protocols and security are typical examples ...
Over the past years, the computing industry has started various initiatives announced to increase computer security by means of new hardware architectures. The most notable effort...
This research employs unsupervised pattern recognition to approach the thorny issue of detecting anomalous network behavior. It applies a connectionist model to identify user behav...
As a number of networked digital devices are ubiquitously used, control of inter-device communications becomes a complicated task. People can no longer keep track of all the device...
Jun Rekimoto, Yuji Ayatsuka, Michimune Kohno, Haru...
Interoperability is currently seen as one of the most significant problems facing the digital rights management (DRM) industry. In this paper we consider the problem of interoper...