Several simulation environments exist that create a place in which students can explore scientific phenomena. In this paper, we propose design guidelines for creating a classroom ...
Peter Malcolm, Tom Moher, Darshan Bhatt, Brian Uph...
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
Watermarking technologies have been envisioned as a potential means for establishing ownership on digital media objects. However, achievable robustness and false-positive rates of...
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
An organization makes a new release as new information become available, releases a tailored view for each data request, releases sensitive information and identifying information...