There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
In this paper, we consider the problem of community detection in directed networks by using probabilistic models. Most existing probabilistic models for community detection are ei...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
— This paper proposes a low-complexity model for vertical antenna radiation patterns, e.g. for inclusion in systemlevel simulations. They can be seen as extensions to the horizon...
Fredrik Gunnarsson, Martin N. Johansson, Anders Fu...