Malicious traffic from self-propagating worms and denialof-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats d...
Abstract. We present a method to specify software for a special kind of safetycritical embedded systems, where sensors deliver low-level values that must be abstracted and pre-proc...
The paper proposes two automatic voltage controllers for the South Korean power system. Simulation results from detailed Korean power-flow models show that the controllers can pro...
We introduce the study of live social insect colonies as a relevant and exciting domain for the development and application of multi-agent systems modeling tools. Social insects p...
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...