By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...
Service provisioning is currently a challenging issue to offer future telecommunication services efficiently and at the same time in a flexible and user friendly manner. As a cont...
Area based triggers denote notifications being generated if a mobile client changes its spatial relation to a defined area, e.g. if it enters or leaves it. By these triggers, new ...
Abstract—In recent years, Peer-to-Peer (P2P) streaming systems experienced tremendous growth and became one of the largest bandwidth consumer on Internet. PPLive, one of the most...
This paper presents Keypad, an auditing file system for theftprone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine...
Roxana Geambasu, John P. John, Steven D. Gribble, ...