Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
An increasing number of mission-critical, embedded, telecommunications, and financial distributed systems are being developed using distributed object computing middleware, such a...
Balachandran Natarajan, Aniruddha S. Gokhale, Shal...
The Lightweight Directory Access Protocol (LDAP) is being used for an increasing number of distributed directory applications. We describe a tool to analyze the performance of LDA...
Xin Wang, Henning Schulzrinne, Dilip D. Kandlur, D...
As information technology supports more aspects of modern life, digital access has become an important tool for developing regions to lift themselves from poverty. Though broadban...
Deploying Wireless LAN for Industrial Control (ICWLAN) has many benefits, such as mobility, low deployment cost and ease of reconfiguration. However, the top concern is robustne...
Qixin Wang, Xue Liu, Weiqun Chen, Wenbo He, Marco ...