This paper presents novel methodologies which allow robust secret key extraction from radio channel measurements which suffer from real-world non-reciprocities and a priori unkno...
The popularity of social bookmarking sites has made them prime targets for spammers. Many of these systems require an administrator’s time and energy to manually filter or remo...
Many modern massively distributed systems deploy thousands of nodes to cooperate on a computation task. Network congestions occur in these systems. Most applications rely on conge...
Abstract – Jointly optimised iterative source- and channel-decoding is used for enhancing the error resilience of the Adaptive Multi Rate WideBand (AMR-WB) speech codec. The resu...
Noor S. Othman, Mohammed El-Hajjar, Osamah Alamri,...
This paper presents a new approach to dynamically monitoring operating system kernel integrity, based on a property called state-based control-flow integrity (SBCFI). Violations ...