This paper introduces an autonomic model-based cyber security management approach for the Internet of Things (IoT) ecosystems. The approach aims at realizing a self-protecting …
This book chapter reviews the history of Healthcare Information Systems (HISs), discusses recent cyber security threats affecting HISs, and then introduces the autonomic computing …
Compressing web traffic using standard GZIP is becoming both popular and challenging due to the huge increase in wireless web devices, where bandwidth is limited. Security and …
Let two static sequences of strings P and S, representing prefix and suffix conditions respectively, be given as input for preprocessing. For the query, let two positive integers k 1 …
D Oh, WW Ro - The Computer Journal, 2012 - academic.oup.com
The widely used multiple pattern matching algorithms experience severe performance degradation when the number of patterns to match increases. In light of this fact, this paper …
MJ Lekha, G Padmavathi, DC Wyld - ICCSEA, SPPR, CSIA, WimoA-2013 …, 2013 - csitcp.com
ABSTRACT Cyber criminals compromise Integrity, Availability and Confidentiality of network resources in cyber space and cause remote class intrusions such as U2R, R2L, DoS and …
Many institutions have suffered significant financial losses as a result of malware's rapid growth over the previous decade, according to studies. Anti-malware businesses have come …