It is a well-known problem that intrusion detection systems overload their human operators by triggering thousands of alarms per day. As a matter of fact, we have been asked by on...
We discuss the issues involved in modelling and verifying key-exchange protocols within the framework of CSP and its model-checking tool FDR. Expressing such protocols within a pr...
: Incident Response and Computer Forensics are two areas with similar goals but distinct process models. While in both cases the goal is to investigate computer security incidents ...
Recent activity within the UK National e-Science Programme has identified a need to establish an ontology for visualization. Motivation for this includes defining web and grid ser...
Numerous recent reports have assessed the adequacy of current generating capacity to meet the growing electricity demand from Plug-in Hybrid Electric Vehicles (PHEVs) and the pote...
Chris Farmer, Paul Hines, Jonathan Dowds, Seth Blu...