Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
Abstract—Network controllers (NCs) are devices that are capable of converting dynamic, spatially extended, and functionally specialized modules into a taskable goal-oriented grou...
Rachana Ashok Gupta, Ahmad A. Masoud, Mo-Yuen Chow
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
The Internet and the devices that connect to it consume a growing and significant amount of electricity. The utilization of desktop to switch Ethernet links is generally very low ...
Vehicular networks will become an important component for information accesses in one’s daily life. A vehicular network provides a vehicular user not only chances to communicate...