We describe the application of plan recognition techniques to support human intelligence analysts in processing national security alert sets by automatically identifying the hosti...
We describe a digital image forensics technique to distinguish images captured by a digital camera from computer generated images. Our approach is based on the fact that image acq...
Sintayehu Dehnie, Husrev T. Sencar, Nasir D. Memon
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
The effect of using automated auditing tools to detect compliance failures in unmanaged business processes is investigated. In the absence of a process execution engine, compliance...
The concept of effective complexity of an object as the minimal description length of its regularities has been initiated by Gell-Mann and Lloyd. The regularities are modeled by m...