Abstract— This paper presents a summary of university research performed on honeypot techniques and summarizes the results Honeypots are computing resources that serve no other p...
As Grids become increasingly relied upon as critical infrastructure, it is imperative to ensure the highly-available and secure day-to-day operation of the Grid infrastructure. The...
Jonathan C. Rowanhill, Glenn S. Wasson, Zach Hill,...
In service-based systems, services from various providers can be integrated following specific workflows to achieve users’ goals. These workflows are often executed and coordina...
Stephen S. Yau, Luping Zhu, Dazhi Huang, Haishan G...
We propose a set of design dimensions that constitute the axes of a taxonomy for ambient information systems. The dimensions are based on an investigation of a wide range of resea...
Martin Tomitsch, Karin Kappel, Andreas Lehner, Tho...
— In recent years Wireless Local Area Networks (WLANs) or hotspots, as they are commonly known, have emerged as a promising networking platform to extend network connectivity in ...
Jorge Hortelano, Juan-Carlos Cano, Carlos Miguel T...