Author:Machaka, P; Bagula, ADate:2015The paper seeks to investigate the use of scalable machine learning techniques to address anomaly detection problem in a large Wi-Fi network. This was in the efforts of achieving a highly scalable preemptive monitoring tool for wireless ...Read more
Author:Schietekat, Sunelle; De Waal, Alta; Gopaul, Kevin GDate:Sep 2016This paper provides a methodology for Validation and Verification (V&V) of a Bayesian Network (BN) model for aircraft vulnerability against Infrared (IR) missile threats. The model considers that the aircraft vulnerability depends both on a ...Read more