The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
—Wide-area coordinating control is becoming an important issue and a challenging problem in the power industry. This paper proposes a novel optimal wide-area monitor and wide-are...
Wei Qiao, Ronald G. Harley, Ganesh K. Venayagamoor...
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
A distributed monitoring system has been developed, which is organized with network cameras, an integrated web/mail server, web-based clients including high-performance cellular p...
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...