In order to provide a portable and accurate typing system for the unambiguous characterization of pathogenic Escherichia coli isolates to the scientific community, we have constru...
Weihong Qi, David W. Lacher, Alyssa C. Bumbaugh, K...
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
Charging of services in a distributed system will become more and more important for systems which are utilized commercially. Such an important distributed system exists in form o...
Burkhard Stiller, Jan Gerke, Placi Flury, Peter Re...
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
This paper presents the main concepts of the IST Project FAIN "Future Active IP Networks" [10], a three-year collaborative research project, whose main task is to develo...
Alex Galis, Bernhard Plattner, Jonathan M. Smith, ...