In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Knowledge discovery from satellite images in spatio-temporal context remains one of the major challenges in the remote sensing field. It is, always, difficult for a user to manuall...
Interfaces based on recognition technologies are used extensively in both the commercial and research worlds. But recognizers are still error-prone, and this results in human perf...
Jennifer Mankoff, Scott E. Hudson, Gregory D. Abow...
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Over the last years the means to collect personal data implicitly or explicitly over the Web and by various kinds of sensors and to combine data for profiling individuals has dram...