Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Security mechanisms such as firewalls commonly deployed throughout the Internet present serious obstacles to basic usage of Mobile IP. In this paper we describe how IP security me...
Reinhard Ruppelt, Andrei Pelinescu, Cristian Const...
Abstract. In this paper we motivate an Architecture Description Language (ADL) for mobile distributed systems based on the π-calculus. Different from other approaches, the non-fu...
The wide proliferation of wireless systems and the use of software radio technologies enables the employment of a heterogeneous network. In this concept services are delivered via...
Paul J. M. Havinga, Gerard J. M. Smit, Lars Kristi...
Common features of current information systems have significant impact on software architectures of these systems. The systems can not be realised as monoliths, formal specifica...