Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
We describe an algorithm for the analysis of color images of basins which gather dirty water, with the objective of detecting and estimate the presence of exceeding combustible oi...
In the near future automatic systems able to detect the traffic situation and to understand driver behavior and intent will probably become vehicles tool to improve driver safety....
The inherent limitations of embedded systems make them particularly vulnerable to attacks. We have developed a hardware monitor that operates in parallel to the embedded processor...
—We address the problem of collaborative sensing in cognitive radios. In a cognitive radio network, all the nodes may sense the spectrum simultaneously. They should then exchange...
Ehsan Azarnasab, Rong-Rong Chen, Koon Hoo Teo, Zhi...