On December 26, 2004, countries in the Indian Ocean basin were struck by a tsunami generated by a large magnitude earthquake just south of the western tip of Sumatra. Observations...
Richard G. Little, William A. Wallace, Thomas A. B...
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
— This paper illustrates a novel decision making algorithm to deliver telecommunication services that match in the best possible way end-user’s requirements to current environm...
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
—This paper addresses the problem of the stability of congestion control for networks with large round-trip communication delays. Nearly all the existed AQM schemes neglect the i...