Microbeams of visible light were studied using a tapered glass capillary. Transmittance of laser light through capillaries with different inlet and outlet diame
This article is dealing with a development of custom chip expander platform with the possibility of accurate temperature control and integration of additional s
Any computer system with known vulnerabilities can be presented using attack graphs. An attacker generally has a mission to reach a goal state that he expects t
Actual software development processes define the different steps developers have to perform during a development project. Usually these development steps are no
Security incidents affecting information systems in cyberspace keep on rising. Researchers have raised interest in finding out how to manage security incidents.
Ad hoc networks are vulnerable to various attacks. In addition, congestion caused by limited resources may occur at any time in the transmission of the packets
Epilepsy is the most common neuropathology. Statistical studies related to the disease reported that 20% - 25% of epileptic patients with occurrence of seizures