Distributed intrusion detection systems are especially vulnerable to attacks because the components reside at a static location and are connected together into a hierarchical stru...
3D virtual environments are increasingly used for education, business and recreation but are often inaccessible to users who are visually impaired, effectively creating a digital ...
Gareth R. White, Geraldine Fitzpatrick, Graham McA...
Meta-design is an emerging conceptual framework aimed at defining and creating socio-technical environments as living entities. It extends existing design methodologies focused on ...
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new...
Stroke is a major cause of disability and health care expenditure around the world. Existing stroke rehabilitation methods can be effective but are costly and need to be improved....
Ahmed Ghali, Andrew S. Cunningham, Tony P. Pridmor...