Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
— This paper presents a new cross-layer approach to achieve active link adaptation and QoS support in ad hoc networks. Upon data reception in a transmission slot, receivers broad...
Alexander Tyrrell, Harald Haas, Gunther Auer, Pete...
By exchanging events in a vehicular ad hoc network (VANET), drivers can receive information that allows them to find relevant places (e.g., parking spaces) or avoid dangerous/unde...
Thierry Delot, Sergio Ilarri, Nicolas Cenerario, T...
Web applications are the Achilles heel of our current ICT infrastructure. NIST's national vulnerability database clearly shows that the percentage of vulnerabilities located ...
Lieven Desmet, Frank Piessens, Wouter Joosen, Pier...
1 This paper presents a new approach to trusted Grid computing in a Peer-to-Peer (P2P) setting. Trust and security are essential to establish lasting working relationships among th...