We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
In video surveillance projects, automatic and realtime event detection solutions are required to guarantee an efficient and cost-effective use of the infrastructure. Many solution...
Francesco Ziliani, Sergio A. Velastin, Fatih Porik...
This paper presents a study on Hierarchical Surrogate-Assisted Evolutionary Algorithm (HSAEA) using different global surrogate models for solving computationally expensive optimiza...
Zongzhao Zhou, Yew-Soon Ong, My Hanh Nguyen, Dudy ...
A fundamental task in computer vision is that of determining the position and orientation of a moving camera relative to an observed object or scene. Many such visual tracking alg...
This paper describes a simple distributed simulation for support of emergency response exercises. The simulation, called the Immersive Synthetic Environment for Exercises (ISEE), ...