igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
This paper presents a mechanism to improve Web server performance with fuzzy-based techniques. A load balancing mechanism based on the fuzzy control technique is developed in such...
Bumjoo Park, Kiejin Park, Dongmin Shin, Sungsoo Ki...
Abstract. Communication technologies, such as e-mail, instant messaging, discussion forums, blogs, and newsgroups connect people together, forming virtual communities. This concept...
Florian Skopik, Hong Linh Truong, Schahram Dustdar
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Leading agent-based trust models address two important needs. First, they show how an agent may estimate the trustworthiness of another agent based on prior interactions. Second, ...