Any computer system with known vulnerabilities can be presented using attack graphs. An attacker generally has a mission to reach a goal state that he expects t
Actual software development processes define the different steps developers have to perform during a development project. Usually these development steps are no
Security incidents affecting information systems in cyberspace keep on rising. Researchers have raised interest in finding out how to manage security incidents.
Ad hoc networks are vulnerable to various attacks. In addition, congestion caused by limited resources may occur at any time in the transmission of the packets
Epilepsy is the most common neuropathology. Statistical studies related to the disease reported that 20% - 25% of epileptic patients with occurrence of seizures