Findings: After evaluating the new system, a better result was generated in line with detection efficiency and the false alarm rate. This demonstrates the value of direct response action in an intrusion detection system
Programmers of forensic tools need to ensure that their tools are of suitable use, robustness and co...
This study utilizes an online survey (open and closed questions) to examine how those whose partners...
Identity and identification are linked by variable meanings and applications and are essential in ma...
In the last a few years a number of highly publicized incidents of Distributed Denial of Service (DD...
THE world is about to witness a "techtonic" shift induced by the iPad. It is expected to result in a...
Consumers require personal firewalls that are highly secure, easy to use, configurable and uptodate ...
Degradation of the ignition system can result in startup failure in an aircraft’s auxiliary power un...
This special issue is in response to the increasing convergence between grids and pervasive computin...
With the magnitude of telemetry data constantly increasing, effective data analytics requires effici...
Microsoft’s upcoming operating system release, Windows Vista, contains the option to encrypt all inf...
Cyber threats and vulnerabilities present an increasing risk to the safe and frictionless execution ...
Adaptive signal control technology (ASCT) systems are to respond (adapt) to real‐time traffic demand...
A shareable notification system allows a user to share a notification with other users. The shareabl...
This paper discusses systems and methods for configuring or installing geofences on mobile devices r...
Today, methods of purifying air have become small and USB‐C powered to allow for personal air purifi...
Programmers of forensic tools need to ensure that their tools are of suitable use, robustness and co...
This study utilizes an online survey (open and closed questions) to examine how those whose partners...
Identity and identification are linked by variable meanings and applications and are essential in ma...
In the last a few years a number of highly publicized incidents of Distributed Denial of Service (DD...
THE world is about to witness a "techtonic" shift induced by the iPad. It is expected to result in a...
Consumers require personal firewalls that are highly secure, easy to use, configurable and uptodate ...
Degradation of the ignition system can result in startup failure in an aircraft’s auxiliary power un...
This special issue is in response to the increasing convergence between grids and pervasive computin...
With the magnitude of telemetry data constantly increasing, effective data analytics requires effici...
Microsoft’s upcoming operating system release, Windows Vista, contains the option to encrypt all inf...
Cyber threats and vulnerabilities present an increasing risk to the safe and frictionless execution ...
Adaptive signal control technology (ASCT) systems are to respond (adapt) to real‐time traffic demand...
A shareable notification system allows a user to share a notification with other users. The shareabl...
This paper discusses systems and methods for configuring or installing geofences on mobile devices r...
Today, methods of purifying air have become small and USB‐C powered to allow for personal air purifi...
Programmers of forensic tools need to ensure that their tools are of suitable use, robustness and co...
This study utilizes an online survey (open and closed questions) to examine how those whose partners...
Identity and identification are linked by variable meanings and applications and are essential in ma...