: The Gamma-Ray scanning technique effective means for the diagnosis and identification of installations and process's problems in general and in particular in the case of dis...
Khalid Laraki, Rachad Alami, Rajaa El Morsli, Abde...
Computer worms -- malicious, self-propagating programs -- represent a significant threat to large networks. One possible defense, containment, seeks to limit a worm's spread ...
— Existing Internet worm research focuses either on worm detection inside an AS, or on prevention of Internet-wide worm epidemic. But of more practical concern is how to repel wo...
Traditional workload management methods mainly focus on the current system status while information about the interaction between queued and running transactions is largely ignore...
Gang Luo, Jeffrey F. Naughton, Curt J. Ellmann, Mi...
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...