Change-point monitoring for the detection of DoS attacks
Who is tweeting on Twitter
Exploiting Eye Tracking for Smartphone Authentication
IEEE Transactions on Dependable and Secure Computing
Lecture Notes in Computer Science
Proceedings of the 26th Annual Computer Security Applications Conference on - ACSAC ’10
Xing Gao
Sushil Jajodia
Bo Dong
Dachuan Liu
Steven Gianvecchio
Zi Chu
Mixing Methods and Theory to Explore Web Activity
How Well Can Congestion Pricing Neutralize Denial of Service Attacks?
How well can congestion pricing neutralize denial of service attacks?
Stay Cool! Understanding Thermal Attacks on Mobile-based User Authentication