An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
While the presence of uncertainty in the geometric and attribute aspects of geographic information is well known, it is also present in temporal information. In spatiotemporal GIS...
There exist well established models for anonymity focusing on traffic analysis, i. e., analysing properties of single messages as, e. g., timing. However there is only little work ...
Finding effectively relevant information is becoming challenging task. In this paper, we propose a smart information filtering system SIM-Filter that integrates user’s identity ...
In this article, we present a model for transformation of resources in information supply. These transformations allow us to reason more flexibly about information supply, and cul...
Bas van Gils, Henderik Alex Proper, Patrick van Bo...