Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
In agile software development, planning meetings play a pivotal role in establishing a concrete understanding of customers’ requirements. Using tools to enhance the effectivenes...
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
Recent research has had some success using the length of time a user displays a document in their web browser as implicit feedback for document preference. However, most studies h...