Abstract—Camera networks are used for a variety of applications including surveillance, traffic monitoring or elderly care. The shift from analog towards fully digitized systems...
To develop agent-based systems, one needs a methodology that supports the development process as common in other disciplines. In recent years, several such methodologies and model...
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...