Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....
— This paper proposes a stochastic framework for detecting anomalies or gathering interesting events in a noisy environment using a sensor network consisting of binary sensors. A...
Current practice in testing JavaScript web applications requires manual construction of test cases, which is difficult and tedious. We present a framework for feedback-directed a...
Shay Artzi, Julian Dolby, Simon Holm Jensen, Ander...
Abstract. We describe the use of non-parametric permutation tests to detect activation in cortically-constrained maps of current density computed from MEG data. The methods are app...
Dimitrios Pantazis, Thomas E. Nichols, Sylvain Bai...
Network protocol design is usually an informal process where debugging is based on successive iterations of a prototype implementation. The feedback provided by a prototype can be...