Leonard J. Popyack

Learn More
Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characterization. Recently, new intrusion detection systems based on data mining are making their appearance in the field. This paper describes the design and experiences with the ADAM ((More)
A new approach to transparent embedding of data into digital images is proposed. It provides a high rate of the embedded data and is robust to common and some intentional distortions. The developed technique employs properties of the singular value decomposition (SVD) of a digital image. According to these properties each singular value (SV) specifies the(More)
The dependence on information technology became critical and IT infrastructure, critical data, intangible intellectual property are vulnerable to threats and attacks. Organizations install Intrusion Detection Systems (IDS) to alert suspicious traffic or activity. IDS generate a large number of alerts and most of them are false positive as the behavior(More)
With the increase of size, interconnectivity, and number of points of access, computer networks have become vulnerable to various forms of information attacks, especially to new, sophisticated ones. It should be pointed out that biological organisms are also complex and interconnected systems that have many points of access; these systems are vulnerable to(More)
The task of digital image compression is the subject of many researches for many years. Up to now this task remains a topic of constant interest. The reason of such interest is that digital media and digital communication are becoming of growing significance worldwide. The subject of this paper is a new original approach to digital image compression. It is(More)