Search
Now showing items 1-4 of 4
Practical authentication in large-scale internet applications
(Georgia Institute of Technology, 2012-07-03)
Due to their massive user base and request load, large-scale Internet applications have mainly focused on goals such as performance and scalability. As a result, many of these applications rely on weaker but more efficient ...
Semantic view re-creation for the secure monitoring of virtual machines
(Georgia Institute of Technology, 2012-06-28)
The insecurity of modern-day software has created the need for security monitoring applications. Two serious deficiencies are commonly found in these applications. First, the absence of isolation from the system being ...
Effective and scalable botnet detection in network traffic
(Georgia Institute of Technology, 2012-07-03)
Botnets represent one of the most serious threats against Internet security since they serve as platforms that are responsible for the vast majority of large-scale and coordinated cyber attacks, such as distributed denial ...
Preventing abuse of online communities
(Georgia Institute of Technology, 2012-07-02)
Online communities are growing at a phenomenal rate and with the large number of users these communities contain, attackers are drawn to exploit these users. Denial of information (DoI) attacks and information leakage ...