CS Store Search
Displaying 1-5 out of 5 total
Web Filtering and Censoring
By Thomas M. Chen, Victoria Wang
Issue Date:March 2010
Information on the Web is not as uncontrolled as it may appear.
Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks
IEEE Internet Computing
By Thomas M. Chen, Varadharajan Venkataramanan
Issue Date:November 2005
Without a fixed security infrastructure, mobile ad hoc networks must distribute intrusion detection among their nodes. But even though a distributed intrusion detection system can combine data from multiple nodes to estimate the likelihood of an intrusion,...
Worm Epidemics in High-Speed Networks
By Thomas M. Chen, Jean-Marc Robert
Issue Date:June 2004
<p>Ever since Melissa struck Microsoft Windows users in late March 1999, computer viruses and worms have become common and persistent. For various practical reasons, many machines remain unprotected by up-to-date software patches or antivirus softwar...
Malicious and Spam Posts in Online Social Networks
By Saeed Abu-Nimeh,Thomas M. Chen,Omar Alzubi
Issue Date:September 2011
A large-scale study of more than half a million Facebook posts suggests that members of online social networks can expect a significant chance of encountering spam posts and a much lower but not negligible chance of coming across malicious links.
Increasing the observability of Internet behavior
Communications of the ACM
By Thomas M. Chen
Issue Date:January 1988
The online Risks Forum has long been a hotbed for discussions of the relative merits of openness relating to the dissemination of knowledge about security vulnerabilities. The debate has now been rekindled, and is summarized here.
Original Search Engine
Need a Web Account?
Become a Member
This site and all contents (unless otherwise noted) are Copyright ©2008, IEEE, Inc. All rights reserved.