Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
The goal of this project is to develop a pedestrian mobility aid for the elderly. In order for this type of assistive technology to be useful and accepted by its intended user com...
Glenn S. Wasson, James P. Gunderson, Sean Graves, ...
This paper presents a study of different models for the growth curves and takeover time in a distributed EA (dEA). The calculation of the takeover time and the dynamical growth cu...
Training teams is an activity that is expensive, time-consuming, hazardous in some cases, and can be limited by availability of equipment and personnel. In team training, the focus...
Michael S. Miller, Jianwen Yin, Richard A. Volz, T...