Next generation malware will by be characterized by the intense use of polymorphic and metamorphic techniques aimed at circumventing the current malware detectors, based on pattern...
—Applying nonequilibrium statistical mechanics we focus on nonequilibrium corrections Δs to entropy and energy of the fluid in terms of the nonequilibrium density distribution f...
The identification of network applications through observation of associated packet traffic flows is vital to the areas of network management and surveillance. Currently popular m...
Nigel Williams, Sebastian Zander, Grenville J. Arm...
This paper introduces an approach for handling complex labelling problems driven by local constraints. The purpose is illustrated by two applications: detection of the road networ...
The goal of this paper is to transfer image processing to vector fields and flow visualization by defining a suitable convolution operation. For this, a multiplication of vecto...