Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
The rapid growth and development of wireless communication services and applications corresponds to an increase in associated energy consumption. For broadband wireless network de...
Moshe T. Masonta, Mjumo Mzyece, Ntsibane Ntlatlapa
Adaptive computer-based training systems aim to enhance the learning experience by personalising the presentation and content delivery according to the preferences of each particu...
Primary user emulation attack in multichannel cognitive radio systems is discussed. An attacker is assumed to be able to send primary-user-like signals during spectrum sensing peri...
We present a method to detect characters on signboards in natural scene images. For many applications, both classifier with small computational cost and the efficient feature set,...