— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
— This paper develops a hierarchical iterative OSNR algorithm based on a game theory framework. A Nash game is formulated between channels with channel utility related to maximiz...
Storytelling applications are increasingly being used and researched due to the fact that they are capable of conveying information and experience to users in a more natural and f...
— Snake robots may one day play a crucial role in search and rescue operations and fire-fighting where it may either be too narrow or to dangerous for personnel to operate. Pro...
Aksel Andreas Transeth, Kristin Ytterstad Petterse...
Document clustering has been used for better document retrieval, document browsing, and text mining in digital library. In this paper, we perform a comprehensive comparison study ...