: Data management in the life sciences has evolved from simple storage of data to complex information systems providing additional functionalities like analysis and visualization c...
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
— This paper proposes a new noncoherent detection system improved based on the differential chaos shift keying (DCSK) and the correlation delay shift keying (CDSK). In this schem...
A number of authentication protocols have been proposed recently, where at least some part of the authentication is performed during a phase, lasting $n$ rounds, with no error corr...