This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
Driven by the ubiquitous deployment of mobile systems, the widespread use of the Internet, the rapid advances in wireless technologies, the insatiable demand for high-speed interac...
The recent Federal Communications Commission regulations for ultra-wideband (UWB) transmission systems have sparked a surge of research interests in the UWB technology. One of the ...
—Voice over IP (VoIP) has had a strong effect on global communications by allowing human voice and fax information to travel over existing packet data networks along with traditi...
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...