Detecting the presence of buffer overflow attacks in network messages has been a major focus. Only knowing whether a message contains an attack, however, is not always enough to m...
— In a mobile ad hoc network, node cooperation in packet forwarding is required for the network to function properly. However, since nodes in this network usually have limited re...
Abstract—Many protocols for ad-hoc wireless networks perform poorly in situations when node cooperation cannot be enforced. This may happen because of the lack of global authorit...
Denial of Service (DoS) attacks have continued to evolve and they impact the availability of Internet infrastructure. Many researchers in the field of network security and system ...
— What would it be like if we could give our robot high level commands and it would automatically execute them in a verifiably correct fashion in dynamically changing environmen...
David C. Conner, Hadas Kress-Gazit, Howie Choset, ...