—While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-...
This paper describes the architecture of a distributed workflow management system in a dynamic environment. The system features autonomous agent components that can adapt to both s...
Maryam Purvis, Martin K. Purvis, Azhar Haidar, Bas...
The last three decades proved Moore’s Law. We witnessed an exponential increase in processing power, memory capacity and communication bandwidth and we expect this increase to c...
Wolfgang Trumler, Faruk Bagci, Jan Petzold, Theo U...
Self configuring VLSI technology architectures offer a new environment for creating novel security functions. Two such functions for physical security architectures are proposed t...
Observing systems facilitate scientific studies by instrumenting the real world and collecting corresponding measurements, with the aim of detecting and tracking phenomena of inte...
David Caron, Abhimanyu Das, Amit Dhariwal, Leana G...