We present a software tool and a framework for security protocol change management. While we focus on trust negotiation protocols in this paper, many of the ideas are generally ap...
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Several tools and methods for source code quality assurance based on static analysis finally reached a state when they are applicable in practice and recognized by the industry. H...
When people interact, they follow distinct rules that coordinate the order of speech, who opens doors, whom and how to greet, and many things more. Such a social codex depends on ...
Deployments of city-wide multi-hop 802.11 networks introduce challenges for maintaining client performance at vehicular speeds. We experimentally demonstrate that current network ...
Anastasios Giannoulis, Marco Fiore, Edward W. Knig...