The limitation of network resource reduces the awareness capability of CVE system, which becomes the main bottleneck for applications in Internet. In this paper, we study the relat...
Abstract. In this paper, efficient and economical methods for water area detection during flood event in mountainous area is proposed. To accomplish this, various case studies were...
In order to complement the incomplete training audit trails, model generalization is always utilized to infer more unknown knowledge for intrusion detection. Thus, it is important ...
Abstract. Today’s computer network is shifting from wired networks to wireless networks. Several attempts have been made to assess the performance of TCP over wireless networks. ...
In this paper, we propose a new clustering procedure for high dimensional microarray data. Major difficulty in cluster analysis of microarray data is that the number of samples to ...