Background: The behaviour of biological systems can be deduced from their mathematical models. However, multiple sources of data in diverse forms are required in the construction ...
Peter Li, Joseph O. Dada, Daniel Jameson, Irena Sp...
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Air traffic flow management (TFM) is a set of processes and procedures which seek to balance the demand for airspace resources with the capacity of these resources. Examples of re...
Lynne Fellman, James S. DeArmon, Kelly A. Connolly
The development of control system for the dynamic processes characterizing uncertainties needs the creating of the proper knowledge base for the controller. In this paper, to solve...
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...