We consider communication primitives that can be executed by an application process to exchange messages with another application process over a TCP/IP network. A communication pri...
Abstract. This paper presents an immune-inspired adaptable error detection (AED) framework for Automated Teller Machines (ATMs). This framework two levels, one level is local to a ...
We present an approach to the combination of an arbitrary number of image features to produce more sophisticated features for anatomical landmark detection. The combination was don...
Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connect...
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...