As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Battery Exhaustion Attack is a “denial of service” attack on mobile devices, causing more battery discharge than normally necessary. The excessive discharge arises out of the ...
Abstract—While log data are being increasingly used as digital evidence in judicial disputes, the extent to which existing secure logging protocols used to collect log data ful...
With the ongoing trend towards the globalization of software systems and their development, components in these systems might not only work together, but may end up evolving indep...
The advanced electric power grid is a cyber-physical system comprised of physical components such as power generators and transmission lines, and cyber components that control the...
—This paper considers the task of software test case generation from a large space of values of input parameters. The purpose of the paper is to create a model of software input ...
Sergiy A. Vilkomir, W. Thomas Swain, Jesse H. Poor...
Along with the popularity of software-intensive systems, the interactions between system components and between humans and software applications are becoming more and more complex...
— This paper presents the architecture, design and implementation of an email server that runs on a bare PC without an operating system or hard-disk. In addition to providing sta...
George H. Ford Jr., Ramesh K. Karne, Alexander L. ...