In the audit process of Internet activities of users in a local area network, one of the most difficult problems is the problem of source authentication i.e. establishing securely...
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
The Internet is a convenient platform to distribute real time traffic information. Thus, we propose a web-based visualization of the current and future traffic load of the entire ...
Andreas Pottmeier, Roland Chrobok, Sigurdur F. Haf...
Detailed and reliable information about the current traffic state is hardly obtainable by the road user. Therefore, we propose a web based visualization of the current and future ...
Florian Mazur, Roland Chrobok, Sigurdur F. Hafstei...