Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
Social Network Analysis is an approach to analysing organisations focusing on relationships as the most important aspect. In this paper we discuss visualisation techniques for Soc...
A review of the main results obtained by the authors concerning analysis of networks with imprecise activity duration times, with a stress on the analysis of criticality, is prese...
Abstract—Tor is a well-known low-latency anonymous communication system that is able to bypass Internet censorship. However, publicly announced Tor routers are being blocked by v...
Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen ...
The problem of biometric sensor interoperability has received limited attention in the literature. Most biometric systems operate under the assumption that the data (viz., images) ...