We propose a new graph representation for ISI channels that can be used for combined equalization and decoding by linear programming (LP) or iterative message-passing (IMP) decodi...
The nonlinear prediction method based on the interspike interval (ISI) reconstruction is applied to the ISI sequence of noisy pulse trains and the detection of the deterministic st...
This paper describes Isis, a system that uses progressive multiples of timelines and event plots to support the iterative investigation of intrusions by experienced analysts using ...
Doantam Phan, J. Gerth, M. Lee, Andreas Paepcke, T...
– The difficulty in managing security threats and vulnerabilities for small and medium-sized enterprises (SME) is investigated. A detailed conceptual framework for asset and thre...
Privacy-preserving data mining is an important issue in the areas of data mining and security. In this paper, we study how to conduct association rule mining, one of the core data...