Abstract The uncontrolled propagation of faults due to malicious intrusion can severely decrease system performance and survivability. Our goal is to employ available information a...
This paper reports our experiences with identifying cyber-based threats to the survivability of power substation control networks. Observations from the initial application of vul...
- The era of new wireless communications is upon us. Eventually it will penetrate into our daily life and change the way we live just like many technological innovations whose orig...
— In this paper, we present a strategy to detect an intrusion using fault localization tools. We propose an intrusion detection system to detect a self-contained in-band wormhole...
A VPN establishes a secure network using the insecure media of the Internet. However, before a VPN can be established keys must be exchanged between the communicating peers. In th...