Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
—The Physical Layer of the IEEE 802.11 standard family provides a set of different modulation and coding schemes and, thus, a multitude of data rates. However, the Standard itsel...
—For a long time, dynamic tracing has been an enabling technique for reverse engineering tools. Tracing can not only be used to record the control flow of a particular component...
Johannes Passing, Alexander Schmidt, Martin von L&...
—There have been several studies on using computer technologies to improve elections and these studies lead to widespread adoption of “direct recording electronic” (DRE) voti...
Studying the release-time activities of a software project — that is, activities that occur around the time of a major or minor release — can provide insights into both the de...