In this paper, we examine general mechanisms that a covert channel may exploit and derive new minimum requirements for setting up a covert channel. We also propose a new classifica...
: The approach of aggregating components into complex software systems is maturing with the rapid development of component technology. How to analyze software reliability from syst...
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Abstract. Software Defined Radio (SDR) is a key enabling technology for mobile wireless Internet. SDR represents unique opportunity to provide Internet connectivity to handheld dev...
We present a framework for visualizing remote distributed data sources using a multi-user immersive virtual reality environment. DIVE-ON is a system prototype that consolidates dis...