The design, development, and use of complex systems models raises a unique class of challenges and potential pitfalls, many of which are commonly recurring problems. Over time, res...
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
Abstract. The decoupling between behavior and communication fostered by coordination becomes of paramount importance in mobile computing. In this scenario, however, coordination te...
The Internet makes it possible to share and manipulate a vast quantity of information efficiently and effectively, but the rapid and chaotic growth experienced by the Net has gener...
This paper suggests a discriminative approach for wavelet denoising
where a set of mapping functions (MF) are applied to the transform
coefficients in an attempt to produce a noi...