A botnet is a network of compromised hosts that is under the control of a single, malicious entity, often called the botmaster. We present a system that aims to detect bots, indepe...
Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan G...
There is a natural intuitive match between anonymity and information theory. In particular, the maximal anonymity loss in anonymity protocols can be matched to the information the...
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
When designing interfaces for mobile devices it is important to take into account the variety of contexts of use. We present a study that examines how changing noise and disturban...
Eve E. Hoggan, Andrew Crossan, Stephen A. Brewster...
Mischief is a system for classroom interaction that allows multiple children to use individual mice and cursors to interact with a single large display [20]. While the system can ...
Neema Moraveji, Kori Inkpen, Ed Cutrell, Ravin Bal...