In this paper, we present ShieldGen, a system for automatically generating a data patch or a vulnerability signature for an unknown vulnerability, given a zero-day attack instance...
Weidong Cui, Marcus Peinado, Helen J. Wang, Michae...
Abstract. We present the results of an exploratory study investigating the feasibility of using multimedia software to teach life skills to adults with learning difficulties. As a ...
Designers are often faced with difficult tradeoffs between easing the user's burden by making security decisions for them and offering features that ensure that users can mak...
Mary Ellen Zurko, Charlie Kaufman, Katherine Spanb...
We present a framework for dening trading scenarios based on sh market auctions. In these scenarios, agents of arbitrary complexity can participate in electronic auctions under ...
Log data adapted for intrusion detection is a little explored research issue despite its importance for successful and efficient detection of attacks and intrusions. This paper pr...