—A major threat to data networks is based on the fact that some traffic can be expensive to classify and filter as it will undergo a longer than average list of filtering rule...
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System mo...
We introduce some modifications to the widely deployed Kerberos authentication protocol. The principle’s secretkey will be independent of the user password to overcome the weak...
Eman El-Emam, Magdy Koutb, Hamdy Kelash, Osama S. ...
Abstract. In the last few years we have concentrated our research efforts on new threats to the computing infrastructure that are the result of combining malicious software (malwar...
Abstract. Jamming is a kind of Denial-of-Service (DoS) attack in which an adversary purposefully emits radio frequency signals to corrupt wireless transmissions. Thus, the communic...