publié le: April 2008
The authors describe a behavioral theory of the dynamics of insider-threat risks. Drawing on data related to information technology security violatio...
This article discusses modeling and detection properties associated with the stochastic behavior of Random Constant Scanning (RCS) worms. Although th...
publié le: July 2008
This article describes a framework for generation and simulation of surrounding vehicles in a driving simulator. The proposed framework generates a t...
This article proposes a metamodel for describing the architecture of a High Level Architecture (HLA) compliant federation. A salient feature of the F...
The Internet is a critical communication infrastructure servicing billions of end-users world-wide. Ongoing studies of the Internet’s operations show...