Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenario...
Abstract. Usage and exploitation of the Internet is a critical requirement for managing and distributing valuable digital assets. This requirement introduces a great number of thre...
Ioannis Chatzigiannakis, Vasiliki Liagkou, D. Salo...
Upon engineering a Bayesian network for the early detection of Classical Swine Fever in pigs, we found that the commonly used approach of separately modelling the relevant observab...
Linda C. van der Gaag, Janneke H. Bolt, Willie Loe...
We present a prototype 3D model search engine called CIL3D (Computational Intelligence Laboratory 3D). CIL3D provides query-by-content 3D model search, by employing a state-of-the...
Panagiotis Papadakis, Ioannis Pratikakis, Stavros ...
— Emerging network applications tend to be built over heterogeneous network resources spanning multiple management domains. Many such applications have dynamic demands for dedica...
Xi Yang, Tom Lehman, Chris Tracy, Jerry Sobieski, ...