We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated A...
Alexandros Kapravelos, Iasonas Polakis, Elias Atha...
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
This paper describes the evolution and the results of the research work carried out by the IRIS group in the field of enterprise integration. This research work began with the ARD...
The primary feature of cognitive radios for wireless communication systems is the capability to optimize the relevant communication parameters given a dynamic wireless channel env...
Measuring the performance of a transit system is the first step toward efficient and
proactive management. In recent years, the use of performance measures for transportation plan...