The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Abstract. We have studied the spatiotemporal behaviour of threshold coupled chaotic neurons. We observe that the chaos is controlled by threshold activated coupling, and the system...
Manish Dev Shrimali, Guoguang He, Sudeshna Sinha, ...
Systems are attempting to detect botnets by examining traffic content for IRC commands or by setting up honeynets. Our approach for detecting botnets is to examine flow characteri...
W. Timothy Strayer, Robert Walsh, Carl Livadas, Da...
Event sequence analysis is an important task in many domains: medical researchers may study the patterns of transfers within the hospital for quality control; transportation exper...
Providing differentiated Quality of Service (QoS) over unreliable wireless channels is an important challenge for supporting several future applications. We analyze a model that h...