We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
—Automatic illicit drug pill matching and retrieval is becoming an important problem due to an increase in the number of tablet type illicit drugs being circulated in our society...
Many information systems log event data about executed tasks. Workflow mining is concerned with the derivation of a graphical workflow model out of this data. Experience from appl...
Abstract. In this paper, an efficient neighbor AR (Access Router) discovery scheme and handoff procedure using neighbor information are proposed. It allows each AR and Mobility Anc...
We present a simple and universal camera calibration method. Instead of extensive setups we are exploiting the accurate angular positions of fixed stars. High precision is achieve...
Andreas Klaus, Joachim Bauer, Konrad F. Karner, Pi...