Charles Nicholas

Learn More
Distributed Intrusion Detection Systems (DIDS) offer an alternative to centralized intrusion detection. Current research indicates that a distributed intrusion detection paradigm may afford greater coverage, consequently providing an increase in security. In some cases, DIDS offer an alternative to centralized analysis, consequently improving scalabity.(More)
Solute diffusion coefficients (D) can indicate a dependence upon actual solute concentrations. Here a single compartment has been utilized, in which effective HCl diffusion to a membrane-mounted glass pH electrode can be measured across the pH spectrum. The study has investigated HCl diffusion through both mucus and water layers as a function of HCl(More)
An electrochemical approach to the determination of permeability through native mucus gel of simple electrochemically active solutes is reported. For all the solutes studied, a reduction in effective diffusion coefficients was observed, with retardation of solute flux by a factor of at least two. However, NADH and the dicarboxylic acid derivative of(More)
We have used total internal reflection fluorescence (TIRF) to measure the adsorption kinetics of a newly synthesized fluorescent derivative of a triblock copolymer comprising two poly(ethylene oxide) arms connected by a poly(butylene oxide) segment. The composition is (EO)400 (BO)55 (EO)400, in which EO represents ethylene oxide, BO represents butylene(More)
Many efforts have been made to use various forms of domain knowledge in malware detection. Currently there exist two common approaches to malware detection without domain knowledge, namely byte ngrams and strings. In this work we explore the feasibility of applying neural networks to malware detection and feature learning. We do this by restricting(More)
We describe an implementation and experiments with a low-distortion randomized projection algorithm [LINI94] that can reduce the number of dimensions in the data by a considerable amount. The performance of the randomized algorithm is compared with that of a popular technique---Principal Component Analysis (PCA). The experiments show that the randomized(More)
Identifying parallel corpora can be an important step in a variety of tasks related to information retrieval. However, at present to identify parallel corpora requires human experts to examine the texts and evaluate their respective contents. We assume in this research that texts which are translations of each other have similarities in their semantic(More)
Malware classification using machine learning algorithms is a difficult task, in part due to the absence of strong natural features in raw executable binary files. Byte n-grams previously have been used as features, but little work has been done to explain their performance or to understand what concepts are actually being learned. In contrast to other work(More)