—Unlike terrestrial wireless communication which uses radio waves, underwater communication relies on acoustic waves. The long latency and limited bandwidth pose great challenges...
The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When designing and developing security solutions for SDR sof...
This paper describes a program called Pret that automates system identification, the process of finding a dynamical model of a black-box system. Pret performs both structural iden...
HOL-TestGen is a specification and test case generation environment extending the interactive theorem prover Isabelle/HOL. The HOL-TestGen method is two-staged: first, the origina...
This paper discusses the design and implementation of ESSPL, an expert system which generates security plans for alarm systems (Figure 1). Security planning is the task of determi...