We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
We present a systematic procedure for selecting facial fiducial points associated with diverse structural characteristics of a human face. We identify such characteristics from th...
Shalini Gupta, J. K. Aggarwal, Mia K. Markey, Alan...
We propose a data warehousing architecture for effective risk analysis in a banking scenario. The core of the architecture consists in two data mining tools for improving the qual...
Gianni Costa, Francesco Folino, Antonio Locane, Gi...
We introduce a framework for face recognition at a distance based on sparse-stereo reconstruction. We develop a 3D acquisition system that consists of two CCD stereo cameras mount...
Ham M. Rara, Shireen Y. Elhabian, Asem M. Ali, Mik...
Small sample size and severe facial variation are two challenging problems for face recognition. In this paper, we propose the SIS (Single Image Subspace) approach to address these...