This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
— Mobile IP is a solution for mobility support in the global Internet. However, it suffers from long handoff delay. Many solutions have been proposed to reduce the handoff delay ...
Network virtualization has emerged as a powerful technique to deploy novel services and experimental protocols over shared network infrastructures. Although recent research has hi...
The World Wide Web has not only revolutionized the area of traditional hypermedia, it is also starting to influence adaptive hypermedia research. The main feature of the World Wid...
Peter Dolog, Rita Gavriloaie, Wolfgang Nejdl, Jan ...