Recent research has shown that while many complex networks follow a power-law distribution for their node degrees, it is not sufficient to model these networks based only on their...
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still nee...
Social networks are important for the Semantic Web. Several means can be used to obtain social networks: using social networking services, aggregating Friendof-a-Friend (FOAF) doc...
While there are different research groups in the mobile computing community, most research requires mobile action data in terms of user calling and mobility patterns. Since collec...
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...