This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Multi-view algorithms reduce the amount of required training data by partitioning the domain features into separate subsets or views that are sufficient to learn the target concep...
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
In human mesenchymal stem cells the envelope surrounding the nucleus, as visualized by the nuclear lamina, has a round and flat shape. The lamina structure is considerably deformed...
Ofer M. Shir, Vered Raz, Roeland W. Dirks, Thomas ...
We consider the problem of decentralized detection under constraints on the number of bits that can be transmitted by each sensor. In contrast to most previous work, in which the ...
XuanLong Nguyen, Martin J. Wainwright, Michael I. ...