Wireless ad-hoc networks do not rely on a pre-existing network structure and are characterized by dynamic changes in the topology. This characteristic makes it difficult to perform...
Many reputation management systems have been developed under the assumption that each entity in the system will use a variant of the same scoring function. Much of the previous wo...
William Conner, Arun Iyengar, Thomas A. Mikalsen, ...
The proliferation of computer viruses and Internet worms has had a major impact on the Internet Community. Cleanup and control of malicious software (malware) has become a key prob...
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
Advances in sensor and wireless technologies will enable thousands, or even millions of small but smart sensors to be deployed for a wide range of monitoring applications. The sen...