Analysis of a Secure Software Upload Technique in Advanced Vehicles using Wireless Links
|
|
- Mark Wade
- 8 years ago
- Views:
Transcription
1 Proceedings of the 007 IEEE Intelligent Transortation Systes Conference Seattle, WA, USA, Set Oct. 3, 007 WeC4.3 Analysis of a Secure Uload Technique in Advanced Vehicles using Wireless Links Irina Hossain, Student Meber, IEEE, Syed Masud Mahud, Meber, IEEE Abstract odules of an advanced vehicle can be udated using Reote Uload (RSU) techniques. The RSU eloys infrastructure-based wireless counication technique where the software sulier sends the software to the targeted vehicle via a roadside Base Station (BS). However, security is critically iortant in RSU to avoid any disasters due to alfunctions of the vehicle or to rotect the rorietary algoriths fro hackers, coetitors or eole with alicious intent. In this aer, we resent a echanis of secure software uload in an advanced vehicle. In order to increase the security level, we roose the vehicle to receive two coies of the software along with the Message Digest (MD) in each coy. The vehicle will install the new software only when it receives two identical coies of the software. To validate our roosition we find analytical exressions of average nuber of acket transissions for successful software udate. We investigate different cases deending on the vehicle s buffer size and verification ethods. Our analytical and siulation results show that it is sufficient to send two coies of software to the vehicle to thwart any security attack while uloading the software. Key words advanced vehicle, authentication, security, software uload and wireless counication. W I. INTRODUCTION ITH the use of inforation and couter-based technologies, advanced electronic systes, sensing and intelligent algoriths, an advanced vehicle incororates various advanced features, such as drive-bywire, teleatics, re-crash warning, reote diagnostics, highway guidance, traffic alert etc. Introduction of new features, iroveent of existing features, udating navigation inforation etc. will require software udate in vehicle s electronic odules fro tie to tie. On the other hand, evolution of wireless technologies has directly benefited the nation s transortation syste. The autootive industry and Intelligent Transortation Syste (ITS) use different wireless technologies for different alications including road safety, traffic anageent and driver assistance. In the sae way, software udate in vehicle s electronic odules could be benefited fro using the wireless technology. Reote software uload, using wireless counication links, will aid the udate rocess by saving Manuscrit was received Aril 5, 007. Irina Hossain is with the Deartent of Electrical and Couter Engineering, Wayne State University, Detroit, MI. Phone: ; Fax: ; e-ail: ihossain@wayne.edu. Syed Masud Mahud is with the Deartent of Electrical and Couter Engineering, Wayne State University, Detroit, MI. Phone: ; Fax: ; e-ail: sahud@ece.eng.@wayne.edu. both consuers and auto anufacturers tie and oney []. When a articular vehicle exeriences soe robles with its functionality, then the software rovider can establish a oint-to-oint counication link with the vehicle via a roadside base station (BS) under which the vehicle resides and sends the necessary software to the non-functioning odule. However, transitting software ackets over radio channels akes eavesdroing, data altering, theft of service, and denial of service (DoS) attacks easier for adversaries. Hence, additional security echaniss are needed to rotect the counication over wireless network. This aer resents a secure architecture for reote software uload in a vehicle. The roosed technique authenticates software rovider as well as the vehicle to which software needs to be uloaded, and rovides integrity of the software being transitted fro vendor to vehicles. In order to increase the security level of the roosed echanis we analyze different scenarios with regard to vehicle s buffer size and software acket verification ethods using analytical and siulation odels. The aer is organized as follows. Section II resents background inforation about the technology used in this work and a brief review of ast researches done, Section III describes the Reote Uload (RSU) architecture we roosed and its analytical odeling, Section IV suarizes the results of analysis and siulation, and Section V resents the conclusion. II. BACKGROUND AND RELATED WORKS Since wireless counication technologies rovide various advantages, such as ortability, flexibility, lower installation cost and increased efficiency, they are becoing the counication infrastructure of choice in our everyday lives. Advances in wireless counication syste have otential value for nation s transortation syste. Using Global Positioning Syste (GPS) and voice-activated cellular syste, OnStar Cororation has successfully deloyed Advanced Autoatic Crash tification (AACN) syste in odern vehicles to reort accidents in reliable and tiely anner []. Auto anufacturers are exloring Bluetooth technology for in-vehicle Wireless Personal Area Network (WPAN) which will connect various on-board devices such as cell hones, PDAs, latos and GPS transceiver [3]. Although wireless technologies offer the users with additional conveniences over the wired technologies, they also introduce unique security challenges. Various threats /07/$ IEEE. 00
2 and vulnerabilities associated with wireless network and hand held devices are listed in [4]. Hence, additional echaniss are needed to rotect the security, i.e., integrity, authenticity and confidentiality of counication over wireless networks. In revious, secure software udate techniques in obile devices over IP network have been roosed [5-6]. Since security rotocols in WLAN and WWAN have security flaws, they roosed both syetric and asyetric/ublic-key crytograhic techniques and the cobination of two (syetric and asyetric). In order to increase the security level, we roose the vehicle to uload two coies of the software and the essage digest (MD) in each coy. Since the vehicle will not accet the software unless the ackets in two coies atch, there is no chance that the vehicle will uload the software that is changed by the hacker. III. THE SECURE SOFTWARE UPLOAD ARCHITECTURE The detail descrition of Reote Uload (RSU) technique in a vehicle using wireless counication link was described in []. In our architecture, we assue that the Auto Coany (AC) ight have its own software distribution center or it has agreeent with a third arty Vendor (SV) to rovide the required software. Each vehicle has its wireless unit installed in it to counicate with each other as well as with the BSs. The AC, the SV and BSs are connected through high-seed wired/wireless networks, whereas the vehicles that travel between cells, can counicate with underlying network via BSs using long-range wireless counication links, e.g., cellular or Wi-Fi links. The BS, under which the targeted vehicle resides, receives software ackets fro the SV using secure counication technique such as SSL/TLS and transits the ackets to the targeted vehicle through secure wireless link (Fig. ). A. Authentication and Key Agreeent Process While a wireless device is installed in a vehiclev, a set n authentication keys kv = ( k V, L, kv ) is rovided to it. Each key is used to authenticate V at each software distribution session. A coy of these keys will also be ket in a secure Central Server (CS) which is aintained by the AC or any trusted arty. The key anageent rocess for vehicle s authentication key was described in []. The AC or any other Certification Authority (CA) issues Digital Certificates to the SV and all BSs which contain their authentic ublic-keys. We assue that all the vehicles and the BSs have a coy of the SV s authentic ublic key and the BSs have each others ublic key. When the AC decides to uload software to a vehicle V, j it sends an unused authentication key k and the odule V nuber to which software needs to be uloaded to the SV using a secure link such as SSL/TLS. Uon receiving the essage, the SV creates a SW_udate_join_request essage that consists of a essage ID, a Vehicle s ID (VID, could be a art of its VIN nuber), a odule ID to which the software needs to be udated, the version nuber of the software and a session key k. The SV digitally signs it, j encryts the essage and the signature using k and sends V it to the BS under which V is currently located. The BS honestly relays the essage tov. After receiving the SW_udate_join_request essage, V decryts the essage j using k, verifies the signature and version nuber of the V software and sends a join_accetance essage. If authentication fails, the vehicle V ignores the essage. BS Sulier BS Fig. Reote Distribution Network using Wireless Link B. Sending the Packets Packet Wireless link High-seed wired link After successful authentication of both the vehicle and the SV, the SV starts sending the software ackets encryted with the session key k. The SV can use this key to create a MAC (Message Authentication Code) value of each software acket and send it along with the acket. The vehicle verifies the authenticity of the acket by checking the MAC, and the integrity of the acket by coaring the hash value of the received acket and the one contained in the MAC. Since both arties share the sae secret key, anyone who has the key could generate the MAC, thus it does not guarantee non-reudiation in case of disute between the SV and the vehicle. Moreover, if an intruder could successfully change both the acket and the MAC value then there is no way that the vehicle could verify the software. A better solution for software uload was roosed in [] where it was suggested that the vehicle receives two coies of the software along with the Message Digest (MD) in each coy. If soe ackets of the first coy do not atch with the corresonding ackets in the second coy, the vehicle requests to send the unatched ackets. After receiving both the coies along with the MDs, the vehicle calculates an MD based on the received software and coares it with the received MD. The vehicle accets the software only when the calculated MD and received MD atch. Fig. shows the flow diagra of the technique. In the next section we resent several ways how the vehicle 0
3 Vehicle receives two coies of software with MD in each coy Vehicle decryts both coies Are the both MDs sae? Vehicle starts air-wise acket coarison between two coies, requests retransission of unatched ackets until two coies atch using one of the techniques entioned here Vehicle coutes MD Received MD = Couted MD? Vehicle requests retransission of MD Fig.. Two-coy Uload Technique receives two coies of the software and find analytical exressions for average nuber of acket transissions (N) for successful software recetion in each case. In order to do the coarison, we also resent the exression of N for single- coy software uload technique. ) tation The sybols and notations that will be used throughout the aer are resented in Table I. Vehicle coutes MD for each coy Received MD = Couted MD? TABLE I NOTATIONS USED IN RSU TECHNIQUE Sybol Significance Vehicle accets the software Received MD = Couted MD? Vehicle rejects the software M Total nuber of software ackets without MD Nuber of ackets in a segent M S Nuber of segents = Packet error robability due to hacking Probability that a acket-air do not atch air due to hacking Probability that the received software is in soft error due to hacking T Average nuber of trial to send one acket or one segent or total software successfully Probability of success in i th trial i N Average nuber of acket transission to receive one good acket N Average nuber of acket transission for successful software uload ) Definitions Fig. 3 shows different software uload techniques that we consider in our analysis. a) Single-coy Uload If there is only one buffer in vehicle s software odule to accet the new software and one coy of the software ackets is sent aended with the MD then it is called Single-coy Uload. Uload Single-coy Uload with Pair Transission Segented Single-coy Uload Fig 3. Different Uload Technique b) Segented Single-coy Uload If the software ackets are divided into segents of certain nuber of ackets and each segent is sent with the MD then it is called the Segented Single-coy Uload. c) Multile-coy Uload If there are ore than one buffer and ultile coies of the software ackets are sent with the MD in each coy unless there is a atch found then it is called the Multilecoy Uload. d) Infinite Buffer Case Case with Rando Packet Delete Multile-coy Uload Infinite Buffer Case Finite buffer with Consecutive Good Packets If there are infinite nuber of buffers to accet ultile coies of a acket to coare a new coy of the acket with the ackets already received until a atch is found then it is called the Infinite Buffer Case. This is the ideal case and not ractical, which requires iniu nuber of acket transissions for a successful software uload. 0
4 e) Case If there are two buffers to accet two coies of a acket and one or both of the ackets are relaced by the new ackets transitted until the vehicle receives a good acket then it is called the Finite buffer Case. f) with Pair Transission If a acket-air do not atch then the vehicle could delete both ackets and request to send another air until a atched air is found. This case is defined as the Finite Buffer with Pair Transission. g) with Rando Packet Delete If a acket-air do not atch then the vehicle could delete one randoly chosen acket and request to send another acket until a atched air is found. This case is defined as the with Rando Packet Delete. h) with Two Consecutive Good Packets If a acket-air do not atch then the vehicle always deletes the older acket and requests to send another acket until a atched air is found. This case is defined as the with Two Consecutive Good Packets. 3) Single-coy Uload After receiving all the encryted software ackets and the MD, the receiving vehicle decryts the ackets, calculates an MD and coares it with the received MD. If both the MDs atch, then the vehicle accets the software. Otherwise, it requests the sulier to retransit the entire software. In this ethod, if a hacker changes at least one software acket, then the calculated MD will differ fro the received MD. Since the vehicle or the sulier does not know which acket has been changed, the sulier needs to retransit the entire software including the MD which requires ore network bandwidth. Moreover, if a hacker can successfully change a acket fro every transission, it is not ossible at all to uload the software successfully. For acket error robability due to hacking, the robability that the software is in error is: M + ( ) = () soft The average nuber of trials required to send the software successfully is i T = soft isoft = = soft () The average nuber of ackets transission for successful software uload is M + N = ( M + ) T = (3) M + ) 4) Segented Single-coy Uload In case of Single-coy Transission, if the nuber of software ackets M increases, the average nuber of acket transission for successful software uload increases exonentially (). An alternative aroach could be to soft divide M software ackets into S segents with ackets in each segent. Then the average nuber of trials required sending one segent successfully is T = + ) (4) Average nuber of acket transission needed for successful uload of S segents is ( + ) S N = + ST = (5) + ) 5) Multile-coy Uload Infinite Buffer Case For each software acket, the vehicle first receives two coies of the acket. If the ackets do not atch, it requests to send another coy of the acket. The third coy is coared with the revious two. If no atch is found it requests for another coy. Since there is infinite nuber of th buffers, after receiving i acket it coares the acket with revious i ackets. The rocess continues until a atched-air is found. The robability that a acket is received successfully in th the i trial is i ), i =,,3L, i = i (6) The average nuber of acket transission for successful uload of one acket is N ( i + ) = i = = i The average nuber of acket transission for successful software uload is ( M + ) N = M + N = (8) 6) with Pair Transission In this case, if both the coies of a acket do not atch, the sulier will send another air of ackets. The robability that a air does not atch is air ( ) (7) = (9) The average nuber of trials to send one acket successfully is T = i ) ) i = i ) ) air i air T = = (0) air The average nuber of acket transissions for successful software uload is ( M + ) N = M + T = () ) 7) with Two Consecutive Good Packets When the two received coies of a acket do not atch, the vehicle relaces the first coy in buffer with the second coy in buffer, requests to send another coy and laces in buffer. The average nuber of acket transissions for 03
5 successful uload of one acket is The average nuber of acket transissions for successful uload of one acket is N = ( i + ) Pi = () ) Then the average nuber of acket transissions for successful software uload is ( M + )( ) N = M + N = (3) IV. SIMULATION RESULTS We now resent siulation results to validate the analytical exressions develoed for different software uload Techniques. For a articular acket error robability due to hacking, we generated a uniforly distributed rando nuber using drand48() function in C++ with gcc coiler. If the rando nuber is less than then the acket was considered as a bad acket and vise versa. Fig. 4 and Table II show the reseblance between the analytical and siulation results for the average nuber of acket transissions for the Single-coy and Multile-coy software uload techniques, resectively. For the Singlecoy transission, at higher the average nubers of acket transissions (N) for successful software uload increases exonentially as the software size increases. However, if the software is sent in segented for, it reduces N considerably. Fig. 5 exelifies the effect of segentation for the software size with 04 ackets and different nuber of segents. The ore the nuber of segents, the lesser is the nuber of acket transissions necessary for successful software uload. Conversely, as the nuber of segents increases, it ight take ore tie to encryt, decryt and transit all the segents. Hence, there should be a trade-off between nuber of segents and rocessing tie. The Two-coy software uload is always suerior to the Single-coy software uload as long as security is concerned. Since the second coy will be transitted after a rando tie interval in a rando acket order, it is very unlikely that an intruder would know whether a second coy will be transitted or not. Moreover, even if an intruder changes one acket of the first coy, it would be difficult for hi to change the sae acket in the second coy due to the randoness of acket transission. Fig. 6 reresents the average nuber of acket transissions (N ) to uload a single acket successfully in the ultile-coy software uload scenario. Unlike the single-coy software uload, the total nuber of acket transissions necessary to uload the entire software is linearly deendent on the software size (eq. (8), () and (3)). Fro Fig. 6 it is also observed that for low values of, on average only two ackets need to be transitted for any of the techniques we entioned above. For a high value of, with Rando Packet Delete rovides the least Average Nuber of Packet Transission, N Fig. 4. Coarison of Analytical and Siulation results for Singlecoy Uload Technique 800 Average Nuber of acket Transission, N x * + Single-coy Transission Packet Error Probability () 0 - S = S = 4 S = 8 S = 6 M = 04, Siulation M = 04, Analytical M = 5, Siulation M = 5, Analytical Effect of Segentation Packet Error Probability () Fig. 5. Effect of segentation on Single-coy Uload for M = 04 nuber of acket transissions with resect to the ideal case where we have infinite nuber of buffers. In general, the hacking robability is very low. Thus, any of the techniques could be used if there are one or ore unatched acket airs. In addition, N does not vary notably between the two buffer case and the infinite buffer case. Addition of ore buffers would not increase the erforance of software uload rearkably. Consequently, we roose to use not ore than two buffers in vehicle s software odules to uload two coies of software. At lower, single-coy software uloads requires fewer nuber of acket transissions than the ultile-coy software uloads. However, the later technique offers additional security if the software ackets are transitted in rando order and the second coy is transitted after a rando tie interval with a very long average value. Hence, we recoend that initially the sulier should send two coies of the software in the vehicle. 04
6 TABLE II. COMPARISON OF ANALYTICAL AND SIMULATION RESULT FOR DOUBLE-COPY TRANSMISSION N (Siulation) Infinite Buffer N (Analytical) with Pair Transission N (Siulation) N (Analytical) with Two Consecutive Good Packets N (Siulation) N (Analytical) with Rando Packet Delete N (Siulation) Average nuber of acket transission, N Two-coy Transission Infinite buffer Finite buffer with air transission Finite buffer with consecutive good ackets Finite buffer with rando acket delete Packet error Probability () Fig. 6. Average nuber of acket transission (N ) for successful uload of a single acket for Two-coy software uload Technique V. CONCLUSION The aer resents detail architecture of RSU in an advanced vehicle s software odules using an existing wireless counication technology such as Wi-Fi or cellular. In this architecture, the BSs act as roxies to reliably and honestly relaying the software ackets fro the SV to the vehicle. Since they do not have access to the software ackets, it eliinates any security threat that ight exist if the BSs locally decryt and encryt the ackets. The architecture rovides utual authentication of the SV and the vehicle. A vehicle s authentication keys are shared between the AC and the vehicle, and Different authentication keys are used for different software distribution sessions which revent known-key attack. We suggest the SV to send two coies of the software to the vehicle to increase the level of security. Moreover, digital The RSU will have huge deand in Auto industry in the near future. If it could be ileented successfully, it will save both AC and consuers tie and oney. REFERENCES [] Syed Masud Mahud, Shobhit Shanker and Irina Hossain, Secure Uload in an Intelligent Vehicle via Wireless Counication Links, in Proc. of the 005 IEEE Intelligent Vehicles Syosiu, June 6-8, 005, Las Vegas, Nevada, USA, [] htt:// [3] Syed Masud Mahud and Shobhit Shanker, An In-Vehicle Secure Wireless Personal Area Network (SWPAN), in the IEEE Transactions on Vehicular Technology, Vol. 55,. 3, , May 006. [4] To Karygiannis and Les Owens, "Wireless Network Security 80., Bluetooth and Handheld Devices," NIST Secial Publication , U.S. Deartent of Coerce, Technology Adinistration, and National Institute of Standards and Technology. htt://csrc.nist.gov/ublications/nistubs/800-48/nist_sp_ df [5] C. Y. Yeun and T. Farnha, Secure Download for Prograable Mobile User Equient, in Proc. of 3rd Generation Conference on 3G Mobile Counication Technologies, 8-0 May, 00, [6] Wael Adi, Ali Al-Qayedi, Khaled Neg, Ali Mabrouk and Sarhan M. Musa, Secured Mobile Device Udate over IP Network, in Proc. of IEEE SoutheastCon, 6-9 March, 004, signature of the SV ensures non-reudiation and the MD of the entire software rovides integrity of the software. This aer focuses on the software uload in a single vehicle. However, if the AC needs to uload software to a large nuber of vehicles, then wireless ulticasting would be a better solution than ultile unicasting to individual vehicles. 05
Transient Performance of PacketScore for blocking DDoS attacks
Transient Perforance of PacketScore for blocking DDoS attacks Mooi Choo Chuah 1 Wing Cheong Lau Yoohwan Ki H. Jonathan Chao CSE Deartent Bell Laboratories EECS Deartent ECE Deartent Lehigh Univ. Lucent
More informationA multi objective virtual machine placement method for reduce operational costs in cloud computing by genetic
International Journal of Couter Networs and Counications Security VOL. 2, NO. 8, AUGUST 2014, 250 259 Available online at: www.icncs.org ISSN 2308-9830 C N C S A ulti obective virtual achine laceent ethod
More informationSUPPORTING YOUR HIPAA COMPLIANCE EFFORTS
WHITE PAPER SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation HEALTHCARE SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation
More informationSCIENTIFIC simulations executed on parallel computing
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 20, NO. X, XXX 2009 1 Scheduling Parallel Task Grahs on (Alost) Hoogeneous Multicluster Platfors Pierre-François Dutot, Tchiou N Také, Frédéric
More informationDynamic Price Quotation in a Responsive Supply Chain for One-of-a-K ind Production
Dynaic Price Quotation in a Resonsive Suly Chain for One-of-a-K ind Production Jian (Ray) Zhang Deartent of Mechanical and Manufacturing Engineering, University of Calgary, 5 University Drive NW, Calgary,
More informationFDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES
Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents
More informationGRADUAL OPTIMIZATION OF URBAN FIRE STATION LOCATIONS BASED ON GEOGRAPHICAL NETWORK MODEL
GRADUAL OPTIMIZATION OF URBAN FIRE STATION LOCATIONS BASED ON GEOGRAPHICAL NETWORK MODEL Yu Yan a, b, Guo Qingsheng a, Tang Xining c a School of Resource and Environent Science, Wuhan University, 29 Luoyu
More informationHow To Balance Over Redundant Wireless Sensor Networks Based On Diffluent
Load balancing over redundant wireless sensor networks based on diffluent Abstract Xikui Gao Yan ai Yun Ju School of Control and Coputer Engineering North China Electric ower University 02206 China Received
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1 Secure Wireless Multicast for Delay-Sensitive Data via Network Coding Tuan T. Tran, Meber, IEEE, Hongxiang Li, Senior Meber, IEEE,
More informationCLOUD computing is quickly becoming an effective and
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 6, YEAR 203 Otial Multiserver Configuration for Profit Maxiization in Cloud Couting Junwei Cao, Senior Meber, IEEE, Kai Hwang, Fellow,
More information1 Adaptive Control. 1.1 Indirect case:
Adative Control Adative control is the attet to redesign the controller while online, by looking at its erforance and changing its dynaic in an autoatic way. Adative control is that feedback law that looks
More informationProtecting Small Keys in Authentication Protocols for Wireless Sensor Networks
Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University
More informationGenerating Certification Authority Authenticated Public Keys in Ad Hoc Networks
SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.
More informationLocal Connectivity Tests to Identify Wormholes in Wireless Networks
Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University xban@cs.sunysb.edu Rik Sarkar Comuter Science Freie Universität Berlin sarkar@inf.fu-berlin.de
More informationProtecting Consumers from Card and other types of Fraud. What the consumer needs to know. How can we combat the rise in fraud
Protecting Consuers fro Card and other types of Fraud What are the trends What the consuer needs to know How can we cobat the rise in fraud What are the future threats Card Fraud What is Card Fraud: Card
More informationAn Approach to Combating Free-riding in Peer-to-Peer Networks
An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008
More informationESTIMATION OF THE DEMAND FOR RESIDENTIAL WATER IN A STONE- GEARY FORM AND THE CHOICE OF THE PRICE VARIABLE MARIE-ESTELLE BINET. Associate Professor
ESTIMATION OF THE DEMAND FOR RESIDENTIAL WATER IN A STONE- GEARY FORM AND THE CHOICE OF THE PRICE VARIABLE MARIE-ESTELLE BINET Associate Professor arie-estelle.binet@univ-rennes1.fr CREM (UMR 611 CNRS),
More informationReliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks
Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois
More informationProvable Ownership of File in De-duplication Cloud Storage
1 Provable Ownershi of File in De-dulication Cloud Storage Chao Yang, Jian Ren and Jianfeng Ma School of CS, Xidian University Xi an, Shaanxi, 710071. Email: {chaoyang, jfma}@mail.xidian.edu.cn Deartment
More informationLecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
More informationCRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS
Review of the Air Force Academy No (23) 203 CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Cătălin CIOACĂ Henri Coandă Air Force Academy, Braşov, Romania Abstract: The
More informationWireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
More informationImplementation of Active Queue Management in a Combined Input and Output Queued Switch
pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University
More informationApplying Multiple Neural Networks on Large Scale Data
0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree
More informationExtended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network
2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona
More informationMeasuring Bottleneck Bandwidth of Targeted Path Segments
Measuring Bottleneck Bandwidth of Targeted Path Segents Khaled Harfoush Deartent of Couter Science North Carolina State University Raleigh, NC 27695 harfoush@cs.ncsu.edu Azer Bestavros Couter Science Deartent
More informationDriving Behavior Analysis Based on Vehicle OBD Information and AdaBoost Algorithms
, March 18-20, 2015, Hong Kong Driving Behavior Analysis Based on Vehicle OBD Inforation and AdaBoost Algoriths Shi-Huang Chen, Jeng-Shyang Pan, and Kaixuan Lu Abstract This paper proposes a novel driving
More informationPERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO
Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:
More informationAdaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel
Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In
More informationA framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries
Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries
More informationMonitoring Frequency of Change By Li Qin
Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial
More informationCharacterizing and Modeling Network Traffic Variability
Characterizing and Modeling etwork Traffic Variability Sarat Pothuri, David W. Petr, Sohel Khan Information and Telecommunication Technology Center Electrical Engineering and Comuter Science Deartment,
More informationSecure synthesis and activation of protocol translation agents
Home Search Collections Journals About Contact us My IOPscience Secure synthesis and activation of rotocol translation agents This content has been downloaded from IOPscience. Please scroll down to see
More informationAnalyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy
Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou
More informationPHYSICIAN OFFICE IT SECURITY GUIDE
PHYSICIAN OFFICE IT SECURITY GUIDE 2015 The CMPA supports the advice and recoendations contained in this guide and encourages their consideration by BC s physicians. Disclaier: Best practices for IT security
More informationResource Allocation in Wireless Networks with Multiple Relays
Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0
More informationSecurity. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
More informationA MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION
9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION
More informationA Certification Authority for Elliptic Curve X.509v3 Certificates
A Certification Authority for Ellitic Curve X509v3 Certificates Maria-Dolores Cano, Ruben Toledo-Valera, Fernando Cerdan Det of Information Technologies & Communications Technical University of Cartagena
More informationASIC Design Project Management Supported by Multi Agent Simulation
ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously
More informationAn Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking
International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters
More information12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
More informationThe AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment
6 JOURNAL OF SOFTWARE, VOL. 4, NO. 3, MAY 009 The AGA Evaluating Model of Custoer Loyalty Based on E-coerce Environent Shaoei Yang Econoics and Manageent Departent, North China Electric Power University,
More informationBuffer Capacity Allocation: A method to QoS support on MPLS networks**
Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean
More informationSearching strategy for multi-target discovery in wireless networks
Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,
More informationSoftware Quality Characteristics Tested For Mobile Application Development
Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology
More informationOption B: Credit Card Processing
Attachent B Option B: Credit Card Processing Request for Proposal Nuber 4404 Z1 Bidders are required coplete all fors provided in this attachent if bidding on Option B: Credit Card Processing. Note: If
More informationInternational Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1
International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi
More informationA Novel Architecture Style: Diffused Cloud for Virtual Computing Lab
A Novel Architecture Style: Diffused Cloud for Virtual Comuting Lab Deven N. Shah Professor Terna College of Engg. & Technology Nerul, Mumbai Suhada Bhingarar Assistant Professor MIT College of Engg. Paud
More informationSecurity Issues In Cloud Computing and Countermeasures
Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department
More informationThe fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM)
Comutational and Alied Mathematics Journal 15; 1(1: 1-6 Published online January, 15 (htt://www.aascit.org/ournal/cam he fast Fourier transform method for the valuation of Euroean style otions in-the-money
More informationPREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS
PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,
More informationEvaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model
Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary
More informationMethod of supply chain optimization in E-commerce
MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent
More informationChapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
More informationShareFile Enterprise: Security Whitepaper
ShareFile Enterrise: 2 Table of contents Introduction 4 SaaS alication tier 5 ShareFiles servers: Web, API, and database overview 5 SaaS alication tier security 6 Encrytion 6 Hash-based message authentication
More informationCANADIAN WATER SECURITY ASSESSMENT FRAMEWORK: TOOLS FOR ASSESSING WATER SECURITY AND IMPROVING WATERSHED GOVERNANCE
CANADIAN WATER SECURITY ASSESSMENT FRAMEWORK: TOOLS FOR ASSESSING WATER SECURITY AND IMPROVING WATERSHED GOVERNANCE KAREN BAKKER, DEPARTMENT OF GEOGRAPHY, UNIVERSITY OF BRITISH COLUMBIA DIANA ALLEN, DEPARTMENT
More informationMulti-Channel Opportunistic Routing in Multi-Hop Wireless Networks
Multi-Channel Oortunistic Routing in Multi-Ho Wireless Networks ANATOLIJ ZUBOW, MATHIAS KURTH and JENS-PETER REDLICH Humboldt University Berlin Unter den Linden 6, D-99 Berlin, Germany (zubow kurth jr)@informatik.hu-berlin.de
More informationOn Software Piracy when Piracy is Costly
Deartment of Economics Working aer No. 0309 htt://nt.fas.nus.edu.sg/ecs/ub/w/w0309.df n Software iracy when iracy is Costly Sougata oddar August 003 Abstract: The ervasiveness of the illegal coying of
More informationA SOA-Based Architecture Framework
A SOA-Based Architecture Fraework Wil M. P. van der Aalst, Michael Beisiegel 2, Kees M. van Hee, Dieter König 3, and Christian Stahl Departent of Matheatics and Coputer Science Eindhoven University of
More informationRoland Berger Strategy Consultants. content. Fresh thinking for decision makers
Roland Berger Strategy Consultants content Fresh thinking for decision akers Opportunities for obile telephone operators in rural areas Custoers in the countryside are different They need unique offerings
More informationNear Light Correction for Image Relighting and 3D Shape Recovery
Near Light Correction for Iage Relighting and 3D Shae Recovery Xiang Huang, Marc Walton, Greg Bearan and Oliver Cossairt Northwestern University, Evanston, IL, USA ANE Iage, Pasadena, CA, USA xianghuang@gailco
More informationHow To Secure Wireless Networks
Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements
More information17609: Continuous Data Protection Transforms the Game
17609: Continuous Data Protection Transforms the Game Wednesday, August 12, 2015: 8:30 AM-9:30 AM Southern Hemishere 5 (Walt Disney World Dolhin) Tony Negro - EMC Rebecca Levesque 21 st Century Software
More informationSecurity and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: info@network-research-group.org Abstract This paper address all
More informationPrivacy Data: The Data Encryptfeii. Protection GAO. ifi: i:.:i:i'y-: - mii'-- ii$i' '- ''yf-.,-:- Piograivi Kvaluation an(i MtM hodcjlogy Division IS:
GAO i MPtrd Stales ( riumji! Airouiiliii^ OtTitr Piograivi Kvaluation an(i MtM hodcjlogy Division /^D(^44 March 1987 Privacy Data: The Data Encryptfeii ikf-.:-... iii-' tw'i-! - ' c'i:'\ :B'-- Protection
More informationDesign of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller
Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference
More informationSecurity in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
More informationTime-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes
Time-Cost Trade-Offs in Resource-Constraint Proect Scheduling Problems with Overlaing Modes François Berthaut Robert Pellerin Nathalie Perrier Adnène Hai February 2011 CIRRELT-2011-10 Bureaux de Montréal
More informationEfficient Key Management for Secure Group Communications with Bursty Behavior
Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:
More informationWhite Paper. Enhancing Website Security with Algorithm Agility
ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today
More informationWeb Application Scalability: A Model-Based Approach
Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research
More informationSTATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND
STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND Giorgio Sciascia *, Sandro Scalise *, Harald Ernst * and Rodolfo Mura + * DLR (German Aerosace Centre) Institute for Communications
More informationMachine Learning Applications in Grid Computing
Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA gvc@dartouth.edu, guofei.jiang@dartouth.edu
More informationarxiv:0805.1434v1 [math.pr] 9 May 2008
Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of
More informationTraffic Analysis for Voice in Wireless IP Networks
Traffic Analysis for Voice in Wireless IP Networks TONI JANEVSKI BORIS SPASENOVSKI Deartment of Telecommunicatis, Faculty of Electrical Engineering University Sv. Kiril i Metodij Karos 2 bb, 1000 Skoje
More informationLarge-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation
Large-Scale IP Traceback in High-Seed Internet: Practical Techniques and Theoretical Foundation Jun Li Minho Sung Jun (Jim) Xu College of Comuting Georgia Institute of Technology {junli,mhsung,jx}@cc.gatech.edu
More informationOn Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks
On Multicast Caacity and Delay in Cognitive Radio Mobile Ad-hoc Networks Jinbei Zhang, Yixuan Li, Zhuotao Liu, Fan Wu, Feng Yang, Xinbing Wang Det of Electronic Engineering Det of Comuter Science and Engineering
More informationClient Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
More informationManaging Complex Network Operation with Predictive Analytics
Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory
More informationBravo Software Group e.commerce enablers... 2 RemoteDesk... 4
Table of Contents Bravo Software Grou e.commerce enablers... 2 RemoteDesk... 4 A suite of roducts for entering orders or invoices remotely, for direct osting to your central accounting system. RemoteDesk
More information457 DEFERRED COMPENSATION PLAN EMERGENCY WITHDRAWAL PACKET
457 DEFERRED COMPENSATION PLAN EMERGENCY WITHDRAWAL PACKET This booklet contains the following forms: 457 Deferred Comensation Plan Emergency Withdrawal Form 457 Deferred Comensation Plan Emergency Withdrawal
More informationBSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2
BSc (Hons.) Computer Science with Network Security BCNS/09/FT Examinations for 2011/2012 - Semester 2 MODULE: WIRELESS NETWORK SECURITY MODULE CODE: SECU 3105 Duration: 2 Hours 15 Minutes Reading time:
More informationTOPIC T3: DIMENSIONAL ANALYSIS AUTUMN 2013
TOPIC T3: DIMENSIONAL ANALYSIS AUTUMN 013 Objectives (1 Be able to deterine the diensions of hysical quantities in ters of fundaental diensions. ( Understand the Princile of Diensional Hoogeneity and its
More informationNXC5500/2500. Application Note. 802.11w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015
NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note 802.11w Management Frame Protection Copyright 2015 ZyXEL Communications Corporation 802.11w Management Frame Protection Introduction IEEE 802.11w
More informationIn the pursuit of becoming smart
WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution
More informationREQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES
REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES Charles Reynolds Christopher Fox reynolds @cs.ju.edu fox@cs.ju.edu Departent of Coputer
More information401K Plan. Effective January 1, 2014
401K Plan Effective January 1, 2014 Summary Plan Descrition Particiation...2 Contributions...2 Disabled Particiants...4 Definition of Comensation...4 Legal Limits on Contributions...4 Enrollment...5 Investment
More informationCOMBINING CRASH RECORDER AND PAIRED COMPARISON TECHNIQUE: INJURY RISK FUNCTIONS IN FRONTAL AND REAR IMPACTS WITH SPECIAL REFERENCE TO NECK INJURIES
COMBINING CRASH RECORDER AND AIRED COMARISON TECHNIQUE: INJURY RISK FUNCTIONS IN FRONTAL AND REAR IMACTS WITH SECIAL REFERENCE TO NECK INJURIES Anders Kullgren, Maria Krafft Folksa Research, 66 Stockhol,
More informationStudy of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
More informationSpotME If You Can: Randomized Responses for Location Obfuscation on Mobile Phones
SotME If You Can: Randomized Resonses for Location Obfuscation on Mobile Phones Daniele Quercia, Ilias Leontiadis, Liam McNamara, Cecilia Mascolo, Jon Crowcroft Comuter Laboratory, University of Cambridge,
More informationVEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune
VEHICLE TRACKING SYSTEM USING GPS Pooja P. Dehankar 1, 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune Prof. S. P. Potdar 2 2 Asst. Professor, SCOE, Vadgaon, Pune Abstract- Global Positioning System is
More information7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
More informationUnderstanding and evaluating risk to information assets in your software projects
Understanding and evaluating risk to information assets in your software projects ugh.. what a mouthful Dana Epp Windows Security MVP Who am I? Microsoft Windows Security MVP Information Security Professional
More informationAn M2M-Based Interface Management Framework for Vehicles with Multiple Network Interfaces
An M2M-Based Interface Management Framework for Vehicles with Multiple Network Interfaces Hong-Jong Jeong, Sungwon Lee, Dongkyun Kim and Yong-Geun Hong Abstract The Intelligent Transportation System (ITS)
More informationLocal Area Network Management
Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent Local Area Network Manageent Introduction This docuent discusses the tasks associated with anageent of Local Area
More informationThe Application of Bandwidth Optimization Technique in SLA Negotiation Process
The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia
More informationConcurrent Program Synthesis Based on Supervisory Control
010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract
More informationStudy on the development of statistical data on the European security technological and industrial base
Study on the developent of statistical data on the European security technological and industrial base Security Sector Survey Analysis: France Client: European Coission DG Migration and Hoe Affairs Brussels,
More informationPiracy and Network Externality An Analysis for the Monopolized Software Industry
Piracy and Network Externality An Analysis for the Monoolized Software Industry Ming Chung Chang Deartment of Economics and Graduate Institute of Industrial Economics mcchang@mgt.ncu.edu.tw Chiu Fen Lin
More information