In this paper we propose a comparative study of Artificial Neural Networks (ANN) and Artificial Immune Systems. Artificial Immune Systems (AIS) represent a novel paradigm in the fi...
Vitoantonio Bevilacqua, Cosimo G. de Musso, Filipp...
Distributed Denial of Service (DDoS) attack mitigation systems usually generate a list of filter rules in order to block malicious traffic. In contrast to this binary decision we ...
Markus Goldstein, Matthias Reif, Armin Stahl, Thom...
In this paper, we present network-on-chip (NoC) design and contrast it to traditional network design, highlighting similarities and differences between the two. As an initial case...
George Nychis, Chris Fallin, Thomas Moscibroda, On...
Abstract. We introduce a novel remotely-mounted attack that can expose the network identity of an anonymous client, hidden service, and anonymizing proxies. To achieve this, we emp...
ln the future, wireless networking will be embedded into a wide variety of common, everyday objects [1]. In many embedded networking situations, the communicating nodes will be ver...