Currently the key problems of query optimization are extensibility imposed by object-relational technology, as well as query complexity caused by forthcoming applications, such as...
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...
We present an agent-based system for modeling, analyzing and reasoning in the maritime domain with the emphasis on detecting, anticipating and preventing illegitimate activities, ...
—We discuss malicious interference based denial of service (DoS) attacks in multi-band covert timing networks using an adversarial game theoretic approach. A covert timing networ...
Emission tomography such as positron emission tomography (PET) and single-photon emission computed tomography (SPECT) can provide in vivo measurements of dynamic physiological and...
Koon-Pong Wong, David Dagan Feng, Steven R. Meikle...