Alexander Marasanov

Learn More
Current approaches to intrusion detection are generally based on the observation of only one source of information such as network traffic, system calls, resource usage etc. However, we would get a more precise conclusion about the incident of intrusion if we used the entire available information. We are going to present an approach to an intrusion(More)
BACKGROUND Studies have shown that exposure to radiofrequency electromagnetic fields (RF-EMF) in the mobile communication frequency range may induce physiological modifications of both spontaneous as well as event-related human electroencephalogram. So far, there are very few peer-reviewed studies on effects of Terrestrial Trunked Radio (TETRA), which is a(More)
  • 1