In this paper, we present techniques for a network forensics analysis mechanism that includes effective evidence presentation, manipulation and automated reasoning. We propose the...
In addition to traditional spam detection applications, new methods of filtering messages – including whitelist and social network based filters – are being investigated to fur...
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
Using microarray technology for genetic analysis in biological experiments requires computationally intensive tools to interpret results. The main objective here is to develop a ...
Saira Ali Kazmi, Yoo-Ah Kim, Baikang Pei, Ravi Nor...
We present a new method for identifying gene sets associated with labeled samples, where the labels can be case versus control, or genotype differences. Existing approaches to thi...