We present an empirical study of the resistance of several protocols to denial of service (DoS) attacks on client-server communication. We show that protocols that use authenticat...
Gal Badishi, Amir Herzberg, Idit Keidar, Oleg Roma...
Abstract. This paper reviews the results of a study into combining evidence from multiple streams of surveillance data in order to improve timeliness and specificity of detection ...
The management of operational risks, i.e., risks of loss resulting from inadequate or failed processes, people and systems or from external events, is crucial for the stability of...
Exploratory testing (ET) – simultaneous learning, test design, and test execution – is an applied practice in industry but lacks research. We present the current knowledge of ...
The ubiquitous computing community has widely researched the use of 802.11 for the purpose of location inference. Meanwhile, Bluetooth is increasingly widely deployed due to its lo...