Recent work on anonymizing online social networks (OSNs) has looked at privacy preserving techniques for publishing a single instance of the network. However, OSNs evolve and a si...
Smriti Bhagat, Graham Cormode, Balachander Krishna...
Running multiple virtual networks, customized for different performance objectives, is a promising way to support diverse applications over a shared substrate. Despite being simpl...
In this paper, we address the modeling and analysis issues associated with a generic theater level campaign where two adversaries pit their military resources against each other ov...
Debasish Ghose, M. Krichman, Jason L. Speyer, Jeff...
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
This paper focuses on the development of a cost-aware Bayesian sequential decision-making strategy for the search and classification of multiple unknown objects over a given domain...
Yue Wang, Islam I. Hussein, Donald R. Brown, Richa...