There is an establishing trend towards the socialization of the web. Virtual communities are becoming very popular web spaces for collaboration and knowledge sharing. However, stu...
In this work, we investigate the viability of a novel combination of evoked responses as input signals for a general-purpose brain-machine interface (BMI). We demonstrate response...
Rudolph L. Mappus IV, Paul M. Corballis, Melody Mo...
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
A major difference between corporate intranets and the Internet is that in intranets the barrier for users to create web pages is much higher. This limits the amount and quality o...
Pavel A. Dmitriev, Nadav Eiron, Marcus Fontoura, E...