Search For:

Displaying 1-5 out of 5 total
Web Filtering and Censoring
Found in: Computer
By Thomas M. Chen, Victoria Wang
Issue Date:March 2010
pp. 94-97
Information on the Web is not as uncontrolled as it may appear.
Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks
Found in: IEEE Internet Computing
By Thomas M. Chen, Varadharajan Venkataramanan
Issue Date:November 2005
pp. 35-41
Without a fixed security infrastructure, mobile ad hoc networks must distribute intrusion detection among their nodes. But even though a distributed intrusion detection system can combine data from multiple nodes to estimate the likelihood of an intrusion,...
Worm Epidemics in High-Speed Networks
Found in: Computer
By Thomas M. Chen, Jean-Marc Robert
Issue Date:June 2004
pp. 48-53
<p>Ever since Melissa struck Microsoft Windows users in late March 1999, computer viruses and worms have become common and persistent. For various practical reasons, many machines remain unprotected by up-to-date software patches or antivirus softwar...
Malicious and Spam Posts in Online Social Networks
Found in: Computer
By Saeed Abu-Nimeh,Thomas M. Chen,Omar Alzubi
Issue Date:September 2011
pp. 23-28
A large-scale study of more than half a million Facebook posts suggests that members of online social networks can expect a significant chance of encountering spam posts and a much lower but not negligible chance of coming across malicious links.
Increasing the observability of Internet behavior
Found in: Communications of the ACM
By Thomas M. Chen
Issue Date:January 1988
pp. 93-98
The online Risks Forum has long been a hotbed for discussions of the relative merits of openness relating to the dissemination of knowledge about security vulnerabilities. The debate has now been rekindled, and is summarized here.