Currently, falling prices in technologies associated with surveillance applications has led to a huge increase in their use in all types of environments, although the most common ...
Today, critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other i...
Alysson Neves Bessani, Paulo Sousa, Miguel Correia...
Abstract--Intervehicle communication is a key technique of intelligent transport systems. Recently, ad hoc networking in the vehicular environment was investigated intensively. Thi...
Zhigang Wang, Lichuan Liu, MengChu Zhou, N. Ansari
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
A "botnet" consists of a network of compromised computers controlled by an attacker ("botmaster"). Recently botnets have become the root cause of many Internet ...