We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
The emergence of new modalities such as Diusion Tensor Imaging (DTI) is of great interest for the characterization and the temporal study of Multiple Sclerosis (MS). DTI indeed giv...
Olivier Commowick, Pierre Fillard, Olivier Clatz...
An algorithm has been developed to automatically construct individual models of normal activity within a home using motion sensor data. Alerts can be generated when a period of in...
Paul Cuddihy, Jenny Weisenberg, Catherine Graichen...
While people have many ideas about how a smart home should react to particular behaviours from their inhabitant, there seems to have been relatively little attempt to organise this...
An C. Tran, Stephen Marsland, Jens Dietrich, Hans ...