Unmanned vehicles (UV’s) are increasingly being employed in civil and military domains often for operations in dangerous environments. Typically these vehicles require some leve...
: The history of computing can be seen in terms of cultural change engendered by philosophical opposition. In education some key philosophical dichotomies are those of commercial-c...
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Kernel rootkits that modify operating system state to avoid detection are a dangerous threat to system security. This paper presents OSck, a system that discovers kernel rootkits ...
Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indraj...
The ever growing request for digital information raises the need for content distribution architectures providing high storage capacity, data availability and good performance. Wh...