Watermarking is one of the most important copyright protection tools for...
Software Defect Prediction aims at predicting which software modules are...
Wave propagation through nodes and links of a network forms the basis of...
Organizations employ various adversary models in order to assess the ris...
Retrieving information from an online search engine is the first and mos...
Today arbitrary synthetic DNA can be ordered online and delivered within...
Large content providers and content distribution network operators usual...
Searching for information about a specific person is an online activity
...
Attackers rapidly change their attacks to evade detection. Even the most...
Trillions of network packets are sent over the Internet to destinations ...
Threat emulators are tools or sets of scripts that emulate cyber-attacks...
We present the Network Traffic Generator (NTG), a framework for perturbi...
Searching for a person's name is a common online activity. However, web
...
For years, attack graphs have been an important tool for security assess...
Information security awareness (ISA) is a practice focused on the set of...
The Internet of things (IoT) has become an integral part of our life at ...
Before executing an attack, adversaries usually explore the victim's net...
Many tasks executed in dynamic distributed systems, such as sensor netwo...