Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Spatial relations are the basis for many selections users perform when they query geographic information systems (GISs). Although such query languages use natural-language-like te...
A. Rashid B. M. Shariff, Max J. Egenhofer, David M...
Abstract. For grey-value images, it is well accepted that the neighborhood rather than the pixel carries the geometrical interpretation. Interestingly the spatial configuration of ...
Jan-Mark Geusebroek, Rein van den Boomgaard, Arnol...
In order to prevent emergencies or critical situations where humans are the origin, a timely provision of information thus obtained for the coordinating services and the on-site st...
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...