Many modern software systems are often large, distributed, written in more than one programming language, and developed using pre-built components. This paper presents the results...
Recently, peer-to-peer (P2P) networks have emerged as a covert communication platform for malicious programs known as bots. As popular distributed systems, they allow bots to comm...
Duc T. Ha, Guanhua Yan, Stephan Eidenbenz, Hung Q....
Research on TCP performance relies either on simulation programs, which run on a single machine, or on the use of real testbeds, where different machines represent different netwo...
Carlo Caini, Rosario Firrincieli, Renzo Davoli, Da...
- This paper presents an optimal energy control scheme for a grid independent photovoltaic (PV) solar system consisting of a PV array, battery energy storage, and time varying load...
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...