Currently, the most significant line of defense against malware is anti-virus products which focus on authenticating valid software from a white list, blocking invalid software f...
Yanfang Ye, Tao Li, Qingshan Jiang, Zhixue Han, Li...
The distinguishing feature of a metasystem is middleware that facilitates viewing a collection of large, distributed, heterogeneous resources as a single virtual machine, where ea...
Marty Humphrey, Frederick Knabe, Adam Ferrari, And...
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
The fault-prone module detection in source code is of importance for assurance of software quality. Most of previous fault-prone detection approaches are based on software metrics...
There is a growing demand for network devices capable of examining the content of data packets in order to improve network security and provide application-specific services. Most...