Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
We analyzed the largest simultaneous collection of full-payload packet traces from a core component of the global Internet infrastructure ever made available to academic researche...
Sebastian Castro, Duane Wessels, Marina Fomenkov, ...
Abstract-- Wireless Sensor Networks (WSNs) rely on innetwork aggregation for efficiency, however, this comes at a price: A single adversary can severely influence the outcome by co...
Parisa Haghani, Panagiotis Papadimitratos, Marcin ...
Fingerprint identification is based on two basic premises: (i) persistence: the basic characteristics of fingerprints do not change with time; and (ii) individuality: the fingerpr...
In this paper, we present two globally convergent vision-based position controllers for a planar two-links manipulator in the so-called fixed-camera configuration, where the camera...
Alessandro Astolfi, Liu Hsu, Mariana S. Netto, Rom...