The present study presents a practical methodology for automatic space monitoring based solely on the perceived acoustic information. We consider the case where atypical situation...
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Two adaptive receivers for jointly detecting active users in an interleave division multiple access (IDMA) system are considered for highly dispersive underwater acoustic channels...
Salah Aliesawi, Charalampos C. Tsimenidis, Bayan S...
Hidden Markov Model (HMM) based applications are common in various areas, but the incorporation of HMM's for anomaly detection is still in its infancy. This paper aims at cla...
We present a science-centric evaluation of a 19-day sensor network deployment at Reventador, an active volcano in Ecuador. Each of the 16 sensors continuously sampled seismic and ...
Geoffrey Werner-Allen, Konrad Lorincz, Jeff Johnso...