—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
IDS research still needs to strengthen mathematical foundations and theoretic guidelines. In this paper, we build a formal framework, based on information theory, for analyzing and...
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, ...
Web-based learning environments are extensively used nowadays. These environments maintain and produce vast amounts of data. Such vastness lead to the application of data mining t...
Ioannis Kazanidis, Stavros Valsamidis, Theodosios ...
In crisis, decisions must be made in human perceptual timeframes under pressure to respond to dynamic uncertain conditions. To be effective management must have access to real time...
Mark Gaynor, Margo I. Seltzer, Steve Moulton, Jim ...
We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store d...