During the last decade, anomaly detection has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks. However, hav...
Mahbod Tavallaee, Wei Lu, Shah Arif Iqbal, Ali A. ...
Micro-mobility protocols aim to improve localized mobility by reducing the handover overheads. In this paper we present the Mobility Plane Architecture (MPA). This architecture wa...
Network administration is a task that requires experience in relating symptoms of network problems with possible causes and corrective actions. We describe the design of a system ...
Ashley George, Adetokunbo Makanju, A. Nur Zincir-H...
In this paper, we propose a blind beamforming technique for multipath CDMA channels, which requires prior knowledge of only the spreading code and the timing of the desired user. ...
Attacks and intrusions to information systems cause large revenue losses. The prevention of these attacks is not always possible by just considering information from isolated sour...