We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
To satisfy the need for a wide range of enterprise modelling choices, it is necessary to have a rich set of processbased and role-based modelling concepts. It is also necessary to...
Shelby Abraham, Keith Duddy, Michael Lawley, Zoran...
Emotion processing has always been a great challenge. Given the fact that an emotion is triggered by cause events and that cause events are an integral part of emotion, this paper...
Sophia Yat Mei Lee, Ying Chen, Shoushan Li, Chu-Re...
This paper reports on the annotation of all English verbs included in WordNet 2.0 with TimeML event classes. Two annotators assign each verb present in WordNet the most relevant e...
Graphs provide an excellent framework for interrogating symmetric models of measurement random variables and discovering their implied conditional independence structure. However,...