Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere ...
This work is a part of an ongoing project that focuses on potential applications of an interactive system that helps children with autism. Autism is classified as a neurodevelopm...
A. Ould Mohamed, Vincent Courboulay, Karim Sehaba,...
Tor, a distributed Internet anonymizing system, relies on volunteers who run dedicated relays. Other than altruism, these volunteers have no incentive to run relays, causing a lar...
In this paper, we present an approach to monitor human activities such as entry, exit and break times of people in a workplace environment. The companion robot then learns the use...
Amol A. Deshmukh, Mei Yii Lim, Michael Kriegel, Ru...