We extend Cyclone, a type-safe polymorphic language at vel of abstraction, with threads and locks. Data races can violate type safety in Cyclone. An extended type system staticall...
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Formal modeling of complex systems is a non-trivial task, especially if a formal method does not facilitate separate development of the components of a system. This paper describes...
Petros Kefalas, George Eleftherakis, Evangelos Keh...
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...