Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
In this study, we defined requirements of ubiquitous environment, which users can monitor and control situations of home anytime, anywhere. In addition we developed and built a mod...
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
—Recent years have witnessed the deployments of wireless sensor networks for mission-critical applications such as battlefield monitoring and security surveillance. These applic...