Claim Your Author Page
Ensure your research is discoverable on Semantic Scholar. Claiming your author page allows you to personalize the information displayed and manage your publications. Semantic Scholar automatically creates author pages based on data aggregated from public sources and our publisher partners.
The security of a software system is an attribute that permeates the whole system. As such, any attempt to address security concerns in a software system must, of necessity, be global in nature, and… Continue Reading
The anycasting communication paradigm is designed to support server replication by allowing applications to easily select and communicate with the "best" server, according to some performance or… Continue Reading
The wide accessibility of the World Wide Web makes it a perfect base for developing computer science courseware modules. Since learning involves more than just receiving transmitted information,… Continue Reading
Abstract : Current tools and techniques to address security issues in a structured, comprehensive manner are sadly lacking. The most common method of addressing security flaws in software systems is… Continue Reading
The usage of commercial off-the-shelf (COTS) software modules in a large, complex software development project has well-known advantages (e.g. reduced development time and reduced cost). However,… Continue Reading
Today, the vast majority of software executing on defense systems is untrusted commercial o -the-shelf software such as Microsoft Windows software. Vulnerabilities in this software may be exploited… Continue Reading