DOTNET

Randomness Tests in Hostile Environments

Abstract:

An acceptable way to assess the quality of an RNG (PRNG) is to apply a standard battery of statistical randomness Read More

Negative Iris Recognition

Abstract:

Elements of a person's biometrics are typically stable over the duration of a lifetime, and thus, it is highly important Read More

Performability Analysis of k-to-l-out-of-n Computing Systems Using Binary Decision Diagrams

Abstract:

Modern computing systems typically utilize a large number of computing nodes to perform coordinated computations in parallel or simultaneously. They Read More

Performability Modeling for RAID Storage Systems by Markov Regenerative Processe

Abstract:

This paper presents a performability model for RAID storage systems using Markov regenerative process to compare different RAID architectures. While Read More

Magic Train: Design of Measurement Methods Against Bandwidth Inflation Attacks

Abstract:

Bandwidth measurement is important for many network applications and services, such as peer-to-peer networks, video caching and anonymity services. To Read More

A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet

Abstract:

Cyber Physical Systems (CPSs) are increasingly being adopted in a wide range of industries such as smart power grids. Even Read More

Rumor Source Identification in Social Networks with Time-varying Topology

Abstract:

Identifying rumor sources in social networks plays a critical role in limiting the damage caused by them through the timely Read More

Faultprog: Testing the Accuracy of Binary-Level Software Fault Injection

Abstract:

Off-The-Shelf (OTS) software components are the cornerstone of modern systems, including safety-critical ones. However, the dependability of OTS components is Read More