: This paper focuses on the different challenges to design a security typed web scripting language. It uses the type system approach on a simple imperative language that captures a...
: The Lack of security policy enforcement in web development languages is one of the most important challenges in web application systems development, as there is no formal check f...
Modern cars offer an increasingly powerful Multimedia environment. While also the potential for an application as Human Computer Interface (HCI) is growing, in this paper we conce...
Layer 2 traceback is an important component of end-toend packet traceback. Whilst IP traceback identifies the origin network, L2 traceback extends the process to provide a more ...
Information assurance in critical infrastructure is an issue that has been addressed generally focusing on real-time or quasi real-time monitoring of the critical infrastructure; ...
In a mobile ubiquitous environment, service interactions between a user device and a service provider should be secure, regardless of the type of device used to access or consume ...
This paper investigates Loss of Self-similarity (LoSS) detection performance using Exact and Asymptotic Second Order Self-Similarity (ESOSS and ASOSS) models. Previous works on Lo...
Mohd Fo'ad Rohani, Mohd Aizaini Maarof, Ali Selama...
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything...
: Research in Vehicular Ad Hoc NETworks (VANETs) has evolved considerably over the last years. Security and privacy in VANETs have recently appealed special interest in the researc...