—With the rapid development and popularity of IT technology, criminals and mischievous computer users are given avenues to commit crimes and malicious activities. As forensic sci...
Kam-Pui Chow, Frank Y. W. Law, Michael Y. K. Kwan,...
The paper describes an experimental system in which we linked together a number of computers over the Internet to form a multi-processor computer system. The arrangeme nt uses Jav...
The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Immune Systems for anomaly detection in computer networks. This paper describes ...
In this paper we propose a comparative study of Artificial Neural Networks (ANN) and Artificial Immune Systems. Artificial Immune Systems (AIS) represent a novel paradigm in the fi...
Vitoantonio Bevilacqua, Cosimo G. de Musso, Filipp...
In this paper we analyze traditional testing methods and computerized adaptive testing. Some innovative features of the Lithuanian European Computer Driving Licence testing system...