There have been serious concerns recently about the security of microchips from hardware trojan horse insertion during manufacturing. This issue has been raised recently due to ou...
Francis G. Wolff, Christos A. Papachristou, Swarup...
In the paper we present a new approach based on application of neural networks to detect SQL attacks. SQL attacks are those attacks that take advantage of using SQL statements to ...
Management in pervasive systems cannot rely on human intervention or centralised decision-making functions. It must be devolved, based on local decision-making and feedback contro...
Alberto E. Schaeffer Filho, Emil C. Lupu, Naranker...
This paper describes a character-based system called “Emotion Sensitive News Agent” (ESNA). ESNA is been developed as a news aggregator to fetch news from different news sourc...
Shaikh Mostafa Al Masum, Helmut Prendinger, Mitsur...
— While the Internet continues to thrive, the resiliency of its fundamental routing infrastructure is not fully understood. In this paper, we analyze the behavior of the de facto...