We have implemented an information flow framework for the Java Virtual Machine that combines static and dynamic techniques to capture not only explicit flows, but also implicit ...
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
As interest in usable security spreads, the use of visual approaches in which the functioning of a distributed system is made visually available to end users is an approach that a...
Abstract. The adoption of mobile technologies into companies frequently follows a technology -driven approach without precise knowledge about the potential benefits that may be rea...
A prototype least cost pipeline routing was performed using various data and GIS analysis. Ahvaz-Marun oil pipeline in south west of IRAN was chosen for development of the prototy...