We introduce models for cooperative mitigating response strategies to suppress large scale Internet worm attack. In our models, cooperating members communicate with others using a...
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
In this paper we provide a formalization of a set of default rules that we claim are required for the transfer of information such as causation, event rate and duration in the inte...
Rodrigo Agerri, John A. Barnden, Mark G. Lee, Alan...
—A primary functionality of wireless sensor networks (WSNs) is transporting the information acquired by the sensors as per the desired application requirements. The diverse appli...