We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
This paper describes an experimental approach to determine the correlation between port scans and attacks. Discussions in the security community often state that port scans should...
Susmit Panjwani, Stephanie Tan, Keith M. Jarrin, M...
The rapid growth of Internet usage has enabled many new online communities to develop. A particularly interesting phenomenon that has arisen through Internet communities is the vi...
In retransmission-based error-control methods, the most fundamental yet the paramount problem is to determine how long the sender (or the receiver) should wait before deciding tha...
Many studies have evaluated different uses of collaborative software. Typically, the research has focused on the shortcomings and, sometimes, the ways end users succeed or fail to...
David F. Redmiles, Hiroko Wilensky, Kristie Kosaka...