Computer equipment produces a wide range of emanations in the visible, electromagnetic, and acoustic spectra. It is well known that electromagnetic emanations can reveal informatio...
A new objective function for neural net classifier design is presented, which has more free parameters than the classical objective function. An iterative minimization technique f...
Jiang Li, Michael T. Manry, Li-min Liu, Changhua Y...
In Computer Mediated Communication, static video cameras provide a restricted field of view of remote sites. The concept of virtual window has been introduced to alleviate this pro...
Simulations often operate on static datasets and data sources, but many simulations would benefit from access to dynamic data. This paper describes our work developing a software ...
Linda F. Wilson, Daniel Burroughs, Jeanne Sucharit...
Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode), some researc...