Within the area of criminal and terrorist social network analysis, there is little research being done on analysing the communication behavior of criminal and terrorist groups. In...
Mark Jyn-Huey Lim, Michael Negnevitsky, Jacky Hart...
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
In this paper, a multimedia data mining framework for discovering important but previously unknown knowledge such as vehicle identification, traffic flow, and the spatio-temporal ...
A key objective of ATM-based networks is to provide at the same time guaranteed QoS to real time and non-real time services. This calls for thoroughly engineered traffic control m...
Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure in a sensor network is the base station, which act...