Learn More
Mobile eye-tracking in external environments remains challenging, despite recent advances in eye-tracking software and hardware engineering. Many current methods fail to deal with the vast range of outdoor lighting conditions and the speed at which these can change. This confines experiments to artificial environments where conditions must be tightly(More)
In order to attack to a network, an attacker first must find vulnerability points of the target network. This task is done through scanning. There are many methods of scan detection. Most of these methods are based on thresholding. Setting a proper threshold value is crucial and depends on many parameters such as network structure and time window. In this(More)
  • 1