In this paper, we show how traditional physical interface components such as switches, levers, knobs and touch screens can be easily modified to identify who is activating each co...
Paul H. Dietz, Bret Harsham, Clifton Forlines, Dar...
Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenario...
Choreography description languages have been put forward for capturing sets of interactions and their control and data dependencies, seen from a global perspective. Choreographies ...
rorizontl integrtion of ess tehnologies to networks nd servies should e ompnied y some kind of onvergene of uthentiE tion tehnologiesF he missing link for the federtion of user ide...
—In a significant class of sensor-network applications, the identities of the reporting sensors constitute the bulk of the communicated data, whereas the message itself can be a...
Lorenzo Keller, Mahdi Jafari Siavoshani, Christina...