Tracing IP packets to their sources, known as IP traceback, is an important task in defending against IP spoofing and DoS attacks. Log-based IP traceback technique is to log pack...
Hands-free devices are often used in a noisy and reverberant environment. Therefore, the received microphone signal does not only contain the desired near-end speech signal but als...
Emanuel A. P. Habets, Sharon Gannot, Israel Cohen,...
—In response to the increasing number of open source software (OSS) project initiatives and the increasing demand of OSS products as alternative solutions by industries, it is im...
Dindin Wahyudin, Khabib Mustofa, Alexander Schatte...
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
The Swedish Defence Research Agency (FOI) has developed a concept demonstrator called the Information Fusion Demonstrator 2003 (IFD03) for demonstrating information fusion methodo...