Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Abstract. We present a method to specify software for a special kind of safetycritical embedded systems, where sensors deliver low-level values that must be abstracted and pre-proc...
Peer-to-peer, or simply P2P, systems have recently emerged as a popular paradigm for building distributed applications. One key aspect of the P2P system design is the mechanism us...
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
This paper presents an agent-based software environment for testing web-based applications. The infrastructure of the system consists of a lightweight agent platform that supports...