Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models ...
Martin Serrano, Sven van der Meer, John Strassner,...
Abstract. In adversarial classification tasks like spam filtering, intrusion detection in computer networks and biometric authentication, a pattern recognition system must not only...
In this paper, we propose an efficient measurement of the eye blinking for drowsy driver detection system that is one of the driver safety systems for the intelligent vehicle. Howe...
In this paper we propose a new approach for false positive reduction in the field of mammographic mass detection. The goal is to distinguish between the true recognized masses and ...