Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
This paper describes an approach for conformance testing of mobile and distributed systems. The approach is based on kiltera — a novel, high-level language supporting the descri...
The Mobile Agent Intrusion Detection System (MAIDS) is an agent based distributed Intrusion Detection System (IDS). A disciplined requirement engineering process is developed to b...
Yanxin Wang, Smruti Ranjan Behera, Johnny Wong, Gu...
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
: This paper describes a new approach for the creation of an adaptive system able to selectively combine dynamic multidimensional information sources to perform state estimation. T...