In this paper, we present a framework for evaluating the security of trust and reputation systems for electronic marketplaces populated with buying and selling agents. Our propose...
The security of a software system is an attribute that permeates the whole system. As such, any attempt to address security concerns in a software system must, of necessity, be gl...
All information systems can be represented by a conceptual and abstracted systems diagram. Therefore all attacks against information systems can also be ted. By studying the securi...
Intrusion Detection System is an integral component of the computer security infrastructure. It is usually put in place to detect computer security policy violations. While its ro...
Abstract— We present a formal framework for robotic cooperation in which we use an extension to Petri nets, known as workflow nets, to establish a protocol among mobile agents b...
Yehia Thabet Kotb, Steven S. Beauchemin, John L. B...