This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Abstract— The term Virtual Private Network (VPN) encompasses a wide array of diverse technologies and network architectures. All VPNs should provide users with the isolation and ...
Large classes of autonomic (self-managing, selfhealing) systems can be created by logically integrating simpler autonomic systems. The configuration method is widely used for such...
Sanjai Narain, Thanh Cheng, Brian A. Coan, Vikram ...
We introduce a secure architecture called an attested meter for advanced metering that supports large-scale deployments, flexible configurations, and enhanced protection for consu...
Michael LeMay, George Gross, Carl A. Gunter, Sanja...
Multi-agent teamwork is critical in a large number of agent applications, including training, education, virtual enterprises and collective robotics. Tools that can help humans an...