The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Supralinear and sublinear pre-synaptic and dendritic integration is considered to be responsible for nonlinear computation power of biological neurons, emphasizing the role of nonlinear integration as opposed to nonlinear output thresholding. How, why, and to what degree the transfer function nonlinearity helps biologically inspired neural network models is not fully understood. Here, we study these...
Neuromorphic computing offers an attractive means for processing and learning complex real-world data. With the emergence of the memristor, the physical realization of cost-effective artificial neural networks is becoming viable, due to reduced area and increased performance metrics than strictly CMOS implementations. In the work presented here, memristors are utilized as synapses in the realization...
High false alarm rates and execution times are among the key issues in host-based anomaly detection systems. In this paper, we investigate the use of trace abstraction techniques for reducing the execution time of anomaly detectors while keeping the same accuracy. The key idea is to represent system call traces as traces of kernel module interactions and use the resulting abstract traces as input...
The number of platforms and sensors with the best capabilities often is limited in the stressing tasking environment relative to the sensing needs. This is the case for Overhead Persistent InfraRed (OPIR) sensors. Sensor assets differ significantly in number, location, and capability over time. Planning for engagements prior to actual tasking sensors involves these factors. This paper proposes a new...
Machine learning is rapidly emerging as a valuable technology thanks to its ability to learn patterns from large data sets and solve problems that are impossible to model using conventional programming logic. As machine learning techniques become more mainstream, they are being applied to a wider range of application domains. These algorithms are now trusted to make critical decisions in secure and...
A Distributed Battle Manager (DBM) system based on Concurrent MACro Partially Observable Markov Decision Processes (CMAC-POMDP) is proposed to manage multiple competing missions. Implementation details are presented for a semi-autonomous management of multiple ad-hoc teams of UAVs operating under extreme uncertainty in a contested environment. The proposed solution is semi-autonomous since command...
Hardware Trojans (HTs) are posing a serious threat to the security of Integrated Circuits (ICs). Detecting HT in an IC is an important but hard problem due to the wide spectrum of HTs and their stealthy nature. In this paper, we propose a runtime Trojan detection approach by applying chaos theory to analyze the nonlinear dynamic characteristics of power consumption of an IC. The observed power dissipation...
In this paper we describe a behavioral state classifier employing a three-factor node reliability measure based upon inferred Ability, Integrity, and Benevolence (AIB) to assess node reliability. In contrast to typical scalar measures, this multi-metric index creates a reliability space that is more descriptive and in which distinctions can be drawn between node behaviors ranging from small deviations...
In today's military environment vast amounts of disparate information are available. To aid situational awareness it is vital to have some way to judge information importance. Recent research has developed a fuzzy-based system to assign a Value of Information (VoI) determination for individual pieces of information. This paper presents an investigation of the effect of integrating subsequent complementary...
In this paper, we address the problem of dynamic packet forwarding with a set of wireless autonomous ad hoc network nodes, where each node acting in a selfish manner tries to use the resources of other nodes. We model the dynamic packet forwarding problem as a modified Rubinstein-Ståhl bargaining game. In our model, a mobile node (player) negotiates with the other mobile node to obtain an agreeable...
Every day over 29 billion spam and phishing messages are sent. Commonly the spammers use compromised email accounts to send these emails, which accounted for 57.9 percent of the global email traffic in September 2014. Previous research has primarily focused on the fast detection of abused accounts to prevent the fraudulent use of servers. State-of-the-art spam detection methods generally need the...
In this paper, we present our analysis using four different systems on two different one-way network traffic data sets. Specifically, we have explored the usage of two network traffic analyzers, namely Corsaro and Cisco ASA 5515-X, and two machine learning based systems, namely the C4.5 Decision Tree classifier and the AdaBoost.M1 classifier. We have employed these four systems on two publicly available...
In this paper we present probabilistic graph fusion algorithms to support information fusion and reasoning over multi-source text media. Our methods resolve misinformation by combining knowledge similarity analysis and conflict identification with source characterization. For experimental purposes, we used the dataset of the articles about current military conflict in Eastern Ukraine. We show that...
As process technology continues scaling down, the memory barrier becomes more severe. Thus, spiking neuromorphic computing that can significantly enhance computing and communication efficiencies has been widely studied. Both conventional CMOS technology and emerging devices have been used in hardware implementation of spiking neuromorphic computing. Particularly, the memristor technology that can...
Counter-smuggling operations constitute a high priority national security mission since drug-trafficking not only involves many criminals, but can also be a source of financing for many illicit activities such as narco-terrorism and arms trafficking. The counter-smuggling mission involves surveillance operations (to search, detect, track and identify potential threats) and interdiction operations...
Reservoir Computing (RC) is a recent neurologically inspired concept for processing time dependent data that lends itself particularly well to hardware implementation by using the device physics to conduct information processing. In this paper, we apply RC to channel estimation in Orthogonal Frequency Division Multiplexing (OFDM) systems. Due to the multipath propagation environment between a transmitter...
The design and development of modern critical systems, including cyber-physical systems, is experiencing a greater reliance on the outsourcing of systems parts and the use of third-party components and tools. These issues pose new risks and threats that affect dependability in general, and security in particular. Not only the chances are higher for system designs to be faulty, yet they can be maliciously...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.