: An new object oriented development suite for data fusion is presented. It is shown how the various issues in the data fusion development like design, implementation, simulation a...
—We propose an access control model that extends RBAC (Role-Based Access Control) to take time and location into account, and use term rewriting systems to specify access control...
Probabilistic models of the performance of computer systems are useful both for predicting system performance in new conditions, and for diagnosing past performance problems. The ...
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
Embedded Web servers are widely used today for IP-based element management. In this paper, we present a new management architecture that combines this technology with XML, DOM, an...