This work concentrates on the problem of watermarking embedding and optimum detection in color images through the use of spread spectrum techniques, both in space (Direct Sequence...
One of the most important steps in attack detection using Intrusion Detection Systems (IDSs) is dealing with huge number of alerts that can be either critical single alerts and mu...
In this paper, we describe disparity, a tool that does parallel, scalable anomaly detection for clusters. Disparity uses basic statistical methods and scalable reduction operation...
— This study proposes an efficient way of interference mitigation for ultra-wideband energy detection. A receiver for pulse position modulation systems is investigated. The inter...
Sami Mekki, Jean-Luc Danger, Benoit Miscopein, Jea...
— We consider the design of a sensor network for detecting an emitter who if present is known to be located in an interval but whose exact position is unknown. We seek to minimiz...