Now showing items 1-10 of 939
Statistical anomaly detection in communication networks
(Defence Science and Technology Laboratory (Dstl) publication, DSTL/PUB107185., 2018-02-08)
This chapter describes the development of algorithms for automatic detection of anomalies from multi-dimensional, undersampled and incomplete datasets. The challenge in this work is to identify and classify behaviours as ...
The Coleman Diagram, Small N Inquiry and Ethnographic Causality
(Sociologica, Italian journal of sociology, 2018-12-14)
Certain key ideas have served to stimulate thought about the nature of sociological inquiry by presenting frameworks which are adjustable to the varying demands of different sorts of data. They provide, as it were, heuristics ...
The Formal Semantics of Program Slicing for Non-Terminating Computations
Since the original development of program slicing in 1979 [.Weiser slices 1979.] there have been many attempts to define a suitable semantics which will precisely define the meaning of a slice. Particular issues include ...
Sources of inspiration in industrial practice: The case of knitwear design.
(Delft University Press / Inderscience, 2003-08-01)
Detection of Advanced Persistent Threat Using Machine-Learning Correlation Analysis
As one of the most serious types of cyber attack, Advanced Persistent Threats (APT) have caused major concerns on a global scale. APT refers to a persistent, multi-stage attack with the intention to compromise the system ...
Using Pattern-of-Life as Contextual Information for Anomaly-based Intrusion Detection Systems
As the complexity of cyber-attacks keeps increasing, new robust detection mechanisms need to be developed. The next generation of Intrusion Detection Systems (IDSs) should be able to adapt their detection characteristics ...
Using ITL and Tempura for large scale specification and simulation.
ITL and Tempura are used for respectively the formal specification and simulation of a large scale system, namely the general purpose multi-threaded dataflow processor EP/3. This paper shows that this processor can be ...
Modeling the risk of invasion and spread of Tuta absoluta in Africa
Tuta absoluta is an invasive insect that originated from South America and has spread to Europe Africa and Asia. Since its detection in Spain in 2006, the pest is continuing to expand its geographical range, including the ...
Comparative study of design with application to engineering design.
(Design Society, 2005)
A recent exploratory study examines design processes across domains and compares them. This is achieved through a series of interdisciplinary, participative workshops. A systematic framework is used to collect data from ...