Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between thes...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, L...
The IP multicast has not been widely used by current internet service operators, and part of this relates to the nature of multicast, which is designed to allow any host to receiv...
In today’s applications, most users disregard the security functionality. They do not have the knowledge and/or the motivation to configure or to use the existing security func...
In recent years, systems for processing environmental information have been evolving from research and development systems to practical applications. Today, many of these systems ...
Franz Josef Radermacher, Wolf-Fritz Riekert, Bernd...
We showcase the Voices from the Rwanda Tribunal project and associated website that provides online public access to a set of historic video interviews with personnel from the Int...