Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
Abstract. The increasing flow of digital information requires the extraction, filtering and classification of pertinent information from large volumes of texts. An important pre...
ion visualization is valuable in learning abstract ideas and new concepts. The existing technology for publishing online papers is lacking in terms of user interaction as well as ...
Searching in decentralized peer-to-peer networks is a challenging problem. In common applications such as Gnutella, searching is performed by randomly forwarding queries to all pee...
Product Distribution (PD) theory is a new framework for controlling Multi-Agent Systems (MAS’s). First we review one motivation of PD theory, as the information-theoretic extens...