An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
— The design and the implementation of software for mobile computers and for pervasive computing environments entail several issues and lead to new requirements. Applications mus...
Davide Carboni, Andrea Piras, Stefano Sanna, Gavin...
—Pull-based mesh streaming protocols have recently received much research attention, with successful commercial systems showing their viability in the Internet. Despite the remar...
Often the process and effort in building interoperable Command and Control (C2) systems and simulations can be arduous. Invariably the difficulty is in understanding what is inten...
The last years have seen a major interest in designing and deploying trust management and public key infrastructures. Yet, it is still far from clear how one can pass from the orga...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...