With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Indiana State University has found a way in its 25+ computing facilities to combine the need for a central stable lab image and small support staff with the academic needs of flex...
The use of formal methods has been growing steadily and there have been a number of successful applications of formal methods in a range of application areas. It seems agreed that...
Statically analyzing requirements specifications to assure that they possess desirable properties is an important activity in any rigorous software development project. The analys...
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
Andrew H. Sung, Jianyun Xu, Patrick Chavez, Sriniv...