We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Traditionally, object recognition is performed based solely on the appearance of the object. However, relevant information also exists in the scene surrounding the object. As supp...
This paper presents an automatic algorithm which reconstructs building models from airborne LiDAR (light detection and ranging) data of urban areas. While our algorithm inherits t...
In this paper, we propose a novel technique for modelbased recognition of complex object motion trajectories using Hidden Markov Models (HMM). We build our models on Principal Com...
Faisal I. Bashir, Wei Qu, Ashfaq A. Khokhar, Dan S...
In the last few years, several algorithms for the automatic alignment of audio and score data corresponding to the same piece of music have been proposed. Among the major drawback...