Type-flaw attacks and multi-protocol attacks on security protocols have been frequently reported in the literature. Heather et al. and Guttman et al. proved that these could be pr...
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
The derivation of specific models from reference models corresponds with the creation of reference model variants. Research on the design of such variant constructions generally a...
This paper presents an interaction model adapted to mixed reality environments known as IRVO (Interacting with Real and Virtual Objects). IRVO aims at modeling the interaction bet...
The current work addresses the development of cognitive abilities in artificial organisms. In the proposed approach, neural network-based agent structures are employed to represen...