: In order to counter Denial-of-Service (DoS) attacks using spoofed source addresses, many IP traceback schemes have been proposed in the last few years. Among them, distanceindexe...
—The success of Web 2.0 communities demonstrates that the users of an information service are willing to participate in the content creation process on a voluntary basis. In this...
We consider the problem of maximizing capacity in a queueing network with flexible servers, where the classes and servers are subject to failure. We assume that the interarrival ...
This paper reports a field evaluation of the mobile phone as a `package' of device and services. The evaluation compares 44 university students' usage and user experienc...
In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a comp...