Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Background: Monitoring body kinematics has fundamental relevance in several biological and technical disciplines. In particular the possibility to exactly know the posture may fur...
R. Bartalesi, Federico Lorussi, M. Tesconi, Alessa...
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main rea...
Svetlana Radosavac, John S. Baras, Iordanis Koutso...
This paper presents a methodology for identifying the autonomous system (or systems) responsible when a routing change is observed and propagated by BGP. The origin of such a rout...
Anja Feldmann, Olaf Maennel, Zhuoqing Morley Mao, ...