Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
—There has been significant recent interest in covert communication using timing channels. In network timing channels, information is leaked by controlling the time between tran...
Sarah H. Sellke, Chih-Chun Wang, Saurabh Bagchi, N...
Classification of real-world data poses a number of challenging problems. Mismatch between classifier models and true data distributions on one hand and the use of approximate inf...
visualization to abstract data sets like network intrusion detection, recommender systems, and database query results. Although display algorithms are a critical component in the v...
Brent M. Dennis, Sarat Kocherlakota, Amit P. Sawan...