Abstract—Authenticity and secrecy of broadcast message content is important in wireless sensor networks deployed for battlefield control, emergency response, and natural resourc...
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, D...
Advanced optical networks deploy wavelength division multiplexing technology to transport an unprecedented amount of information per fiber. Each optical channel transports informat...
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
Unsolicited and undesirable e-mail (spam) is a growing problem for Internet users and service providers. We present the Secure Internet Content Selection (SICS) protocol, an effic...
Cloud computing uses virtualization technologies to offer a non-shared use rental of computer resources with publicly accessible worker nodes. However, unlike Grid computing, Cloud...
Matthias Schmidt, Niels Fallenbeck, Matthew Smith,...