Today mobile computing is pervasively taking over the traditional desktop computing. Mobile devices are characterized by abrupt and unannounced changes in execution context. The ap...
Uzair Ahmad, S. Y. Lee, Mahrin Iqbal, Uzma Nasir, ...
Abstract—Despite a long standing need to incorporate human factors into security risk analysis, taking a balanced approach to analysing security and usability concerns remains a ...
A high percentage of false positives remains a problem in current network security detection systems. With the growing reliance of industry on computer networks, and the growing v...
In the context of FPGAs, system downgrade consists in preventing the update of the hardware configuration or in replaying an old bitstream. The objective can be to preclude a syst...
Abstract. Many users routinely log in to their system with system administrator privileges. This is especially true of home users. The advantage of this setup is that these users c...
Dinan Gunawardena, Jacob Scott, Alf Zugenmaier, Au...