Computer worms are a serious problem. Much research has been done to detect and contain worms. One major deficiency in most research is that the claims are supported by theoretic...
Senthilkumar G. Cheetancheri, Denys L. Ma, Karl N....
— Data and telephone service providers have started considering migration to an IP based environment. This paper presents an unstructured peer-to-peer approach to initiating and ...
Khashayar Khavari, Chuen Liang, Ali Tizghadam, Far...
The increasing demand for and the wide adoption of mobile technologies have been witnessed in enterprise information technology (IT) environments in recent years. However, there e...
— Key management is a major challenge in the design and deployment of secure wireless sensor networks. A common assumption in most distributed key management schemes is that all ...
This paper addresses the problem of improving quality of security for real-time parallel applications on heterogeneous clusters. We propose a new security- and heterogeneity-drive...