This paper describes an experimental approach to determine the correlation between port scans and attacks. Discussions in the security community often state that port scans should...
Susmit Panjwani, Stephanie Tan, Keith M. Jarrin, M...
Multiple studies in the information systems (IS) literature recognize that information technology (IT) investments may not yield immediate returns. Nevertheless, there has been a ...
Diagram-based UML notation is limited in its expressiveness thus producing a model that would be severely underspecified. The flaws in the limitation of the UML diagrams are solve...
Luis Reynoso, Marcela Genero, Mario Piattini, M. E...
As a flexible needle with a bevel tip is pushed through soft tissue, the asymmetry of the tip causes the needle to bend. We propose that, by using nonholonomic kinematics, contro...
Robert J. Webster III, Noah J. Cowan, Gregory S. C...
A new enhancement of RANSAC, the locally optimized RANSAC (LO-RANSAC), is introduced. It has been observed that, to find an optimal solution (with a given probability), the numbe...