Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
The task of protecting software integrity can be approached with a two-part strategy that addresses threats to the static integrity of memory contents and the dynamic integrity of software memory interactions. Although their resultant...
In this dissertation we study the security and survivability of wireless mobile network systems in two distinct threat models: the Byzantine threat model and the sel¯sh node threat model. Wireless mobile networks are collections of self...
The digital revolution, fired by the development of the information and communication technologies, has fundamentally changed the way we think, behave, communicate, work and earn livelihood (the World Summit on the Information Society)....
This dissertation presents contributions to several problems relevant to cyber physical system (CPS) vulnerability research. Cyber physical systems encompass any computational systems that interact with physical processes, encompassing...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.