This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
: Mobile technology appears promising as a method to promote group performance in circumstances dependent on time, but not member proximity. However, the success of mobile technolo...
Camera sensor networks--wireless networks of low-power imaging sensors--have become popular recently for monitoring applications. In this paper, we argue that traditional vision-ba...
Purushottam Kulkarni, Prashant J. Shenoy, Deepak G...
Abstract—Advances in mobile networks and positioning technologies have made location information a valuable asset in vehicular ad-hoc networks (VANETs). However, the availability...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
Background: We present a statistical method of analysis of biological networks based on the exponential random graph model, namely p2-model, as opposed to previous descriptive app...
Svetlana Bulashevska, Alla Bulashevska, Roland Eil...