Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine l...
As the second generation of electronic commerce, the framework of agent based commerce is proposed. Since the communication messages and solution methods of agents are significant...
A simple type confusion attack occurs in a security protocol, when a principal interprets data of one type as data of another. These attacks can be successfully prevented by \taggi...
Background: Type III secretion system (T3SS) is a specialized protein delivery system in gramnegative bacteria that injects proteins (called effectors) directly into the eukaryoti...
Yang Yang, Jiayuan Zhao, Robyn L. Morgan, Wenbo Ma...
Companies are developing a growing interest in aligning their information systems in a process-oriented way. However, current processaware information systems (PAIS) fail to meet p...
Stefanie Rinderle, Barbara Weber, Manfred Reichert...