This paper presents a novel host-based combinatorial method based on k-Means clustering and ID3 decision tree learning algorithms for unsupervised classification of anomalous and ...
Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increa...
Pieter H. Hartel, Pascal van Eck, Sandro Etalle, R...
Abstract. Business process models usually capture data exchanged between tasks in terms of objects. These objects are commonly standardized using reference data models that prescri...
Abstract Utility Data Center (UDC) provides a exible, coste ective infrastructure to support the hosting of applications for Internet services. In order to enable the design of a \...
Abstract. We introduce a generative probabilistic model for segmentation of tumors in multi-dimensional images. The model allows for different tumor boundaries in each channel, ref...
Bjoern H. Menze, Koenraad Van Leemput, Danial Lash...