Packet sampling is widely used in network monitoring. Sampled packet streams are often used to determine flow-level statistics of network traffic. To date there is conflicting e...
Bruno F. Ribeiro, Donald F. Towsley, Tao Ye, Jean ...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
JavaScript has become a central technology of the web, but it is also the source of many security problems, including cross-site scripting attacks and malicious advertising code. ...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using the proof assistant Isabelle/HOL, we have machine-checked a recent work of B...
A current research project at the University of Strathclyde is introduced which aims to better understand the role of distributed engineering design in industry and address presen...
Steven P. MacGregor, Avril I. Thomson, Neal P. Jus...