A hybrid learning framework uses a collective anomaly to analyze patterns in denial-of-service attacks along with data clustering to distinguish an attack from normal network traffic. In two evaluation datasets, the framework achieved higher hit rates relative to existing anomaly-detection techniques. Mohiuddin Ahmed, "Thwarting DoS Attacks: A Framework for Detection based on Collective Anomalies and Clustering", Computer, vol.
To maintain Moore's law, the semiconductor industry decided a decade ago that a new transistor was imperative. That silver bullet has yet to materialize, but computer design innovations are now maintaining or even exceeding expected scaling progress. This theme issue gives a cross-sectional view of these new scaling drivers.
Recent advances in deep learning for image recognition have spawned numerous challenge-based learning competitions in which participants can use a low-cost GPU graphics card to accomplish goals that required expensive resources in the recent past. Students are encouraged to explore this exciting new field of research by entering these competitions. Scooter Willis, "Stand on the Shoulders of Giants", Computer, vol.
Penetration testing is a crucial defense against common web application security threats such as SQL injection and cross-site scripting attacks. A proposed web vulnerability scanner automatically generates test data with combinative evasion techniques, significantly expanding test coverage and revealing more vulnerabilities.