Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Log data adapted for intrusion detection is a little explored research issue despite its importance for successful and efficient detection of attacks and intrusions. This paper pr...
Background: Event sequences where different types of events often occur close together arise, e.g., when studying potential transcription factor binding sites (TFBS, events) of ce...
This study seeks to quantify the effectiveness of a broad range of acoustic features for speaker identification and their impact in feature fusion. Sixteen different acoustic feat...
Aaron D. Lawson, Pavel Vabishchevich, Mark C. Hugg...
Abstract— We study transmission schemes for lifetime maximization in wireless sensor networks. Specifically we consider the network where all the sensors observe uncorrelated si...