: Network intrusion detection sensors are usually built around low level models of network traffic. This means that their output is of a similarly low level and as a consequence, ...
Abstract-- Vehicle-to-vehicle communications can be used effectively for intelligent transport systems (ITS) and locationaware services [1]. The ability to disseminate information ...
: In a data warehousing process, the phase of data integration is crucial. Many methods for data integration have been published in the literature. However, with the development of...
Digital identity management intra and inter information systems, and, service oriented architectures security, are the roots of identity federation. This kind of security architec...
The goal of this paper is to identify and discuss scalability issues for the measurement-based analysis of the availability in large-scale networks using IP multicast technology. ...