The recent diversification of telephony infrastructure allows users to communicate through landlines, mobile phones and VoIP phones. However, call metadata such as Caller-ID is ei...
Vijay A. Balasubramaniyan, Aamir Poonawalla, Musta...
SSL/TLS is a standard protocol for secure Internet communication. Despite its great success, today's SSL deployment is largely limited to security-critical domains. The low a...
Keon Jang, Sangjin Han, Seungyeop Han, Sue B. Moon...
Terrorist or criminal social network analysis is helpful for intelligence and law enforcement force in investigation. However, individual agency usually has part of the complete te...
Pervasive information systems give an overview of what digital environments should look like in the future. From a data-centric point of view, traditional databases have to be used...
The goal of a DDoS (distributed denial of service) attack is to completely tie up certain resources so that legitimate users are not able to access a service. It has long been an ...