Sensor networks are expected to play an important role in hybrid protection infrastructures when combined with robots and human decision makers. In order to be effective, detectio...
Background traffic has a significant impact on the behavior of network services and protocols. However, a detailed model of the background traffic can be extremely time consuming i...
Accounting frauds have continuously happened all over the world. This leads to the need of predicting business failures. Statistical methods and machine learning techniques have b...
Shi-Ming Huang, Chih-Fong Tsai, David C. Yen, Yin-...
A "botnet" consists of a network of compromised computers controlled by an attacker ("botmaster"). Recently botnets have become the root cause of many Internet ...
We analyze the problem of reducing packet losses due to the authentication time which is required when an ad hoc node switches across different gateways in a mobile ad hoc network...