Refreshing results…
Real-Time Verification of Integrity Policies for Distributed Systems
Download from doi.orgMasquerade Attacks Based on User's profile
Download from www.researchgate.netTowards Building a Masquerade Detection Method Based on User File System Navigation
Download from doi.orgEvader Surveillance under Incomplete Information
Download from www.researchgate.netSome Encounters on the Productive Use of a Failed Proof Attempt or a Counterexample
Download from doi.orgOn Process Equivalence = Equation Solving in CCS
Download from www.researchgate.netOn the Automated Correction of Protocols with Improper Message Encoding
Download from www.researchgate.netA Complexity result for the pursuit-evasion game of maintaining visibility of a moving evader
Download from www.cimat.mxA Method for Patching Interleaving-Replay Attacks in Faulty Security Protocols
Download from doi.orgLocal Reference Frames vs. Global Reference Frame for Mobile Robot Localization and Path Planning
Download from www.researchgate.netPlanning exploration strategies for simultaneous localization and mapping
Download from citeseerx.ist.psu.eduWeb attack detection using ID3
Download from link.springer.comA Framework for Reactive Motion and Sensing Planning: A Critical Events-Based Approach.
Download from citeseerx.ist.psu.eduMissing publications? Search for publications with a matching author name.