Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Dynamic criminal network analysis is important for national security but also very challenging. However, little research has been done in this area. In this paper we propose to use...
Jennifer Jie Xu, Byron Marshall, Siddharth Kaza, H...
Multicore platforms are predicted to become significantly larger in the coming years. Given that real-time workloads will inevitably be deployed on such platforms, the scalabilit...
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
The test case execution order affects the time at which the objectives of testing are met. If the objective is fault detection, an inappropriate execution order might reveal most ...