New! You can now keep track of new articles from Computers and Security on your personalized homepage!
The Internet is popular, with email use functioning as the major Internet activity. However, spam has recently become a major problem impeding the use of email. Many spam filtering techniques have been implemented so far. Most current anti-spamming techniques filter out junk emails based on email...
Modeling and analyzing information system vulnerabilities help predict possible attacks to computer networks using vulnerabilities information and the network configuration. In this paper, we propose a comprehensive approach to analyze network vulnerabilities in order to answer the safety problem...
The present paper explores the challenges, issues and solutions to satisfy the security requirements of a Multi-Agent System (MAS) based on the JADE framework. By means of a prototype system used for Learning Management, an adequate security concept for MAS in general is presented. Hereby several...