Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly,...
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
VideoCLEF 2009 offered three tasks related to enriching video content for improved multimedia access in a multilingual environment. For each task, video data (Dutch-language telev...
Many papers explain the drop of download performance when two TCP connections in opposite directions share a common bottleneck link by ACK compression, the phenomenon in which dow...
Martin Heusse, Sears A. Merritt, Timothy X. Brown,...
— The paper presents some interim results from an ongoing research on the application of data/text mining methodologies being investigated to modelling the seasonal climate varia...
Subana Shanmuganathan, Ana Perez Kuroki, Ajit Nara...