Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Abstract. Pervasive computing applications must be sufficiently autonomous to adapt their behaviour to changes in computing resources and user requirements. This capability is know...
In this paper we introduce NUBIA, a middleware that combines, through business rules, information generated by heterogeneous and autonomous systems. Communication between NUBIA and...