Institution
Deutsche Telekom
Company•Welwyn Garden City, United Kingdom•
About: Deutsche Telekom is a company organization based out in Welwyn Garden City, United Kingdom. It is known for research contribution in the topics: Telecommunications network & Terminal (electronics). The organization has 3473 authors who have published 5208 publications receiving 65429 citations. The organization is also known as: DTAG & German Telecom.
Topics: Telecommunications network, Terminal (electronics), The Internet, Radio access network, Network packet
Papers published on a yearly basis
Papers
More filters
•
01 Oct 2009TL;DR: In this paper, the authors propose a method for efficiently detecting unknown malicious code, according to which a Data Set that is a collection of files that includes a first subset with malicious code and a second subset with benign code files is created and malicious and benign files are identified by an antivirus program.
Abstract: A method for efficiently detecting unknown malicious code, according to which a Data Set that is a collection of files that includes a first subset with malicious code and a second subset with benign code files is created and malicious and benign files are identified by an antivirus program. All files are parsed using n-gram moving windows of several lengths. The TF representation is computed for each n-gram in each file and an initial set of top features of all n-grams is selected, based on the DF measure. The number of the top features is reduced to comply with the computation resources required for classifier training, by using features selection methods. The optimal number of features is determined, based on the evaluation of the detection accuracy of several sets of reduced top features and a dataset with a distribution of benign files is greater than the distribution of and malicious files is prepared, where a portion of the dataset is used for training the classifier. New malicious codes within a stream of new files are automatically detected and acquired by using Active Learning.
39 citations
•
09 Jan 2012TL;DR: In this article, a method of verifying the identity of users according to their interaction with a keyboard device of a computer was proposed, in which during a training phase in which a group of users are trained, input streams of keystrokes performed by each of the trained users are recorded and similar pairs of consecutive keystroke are joined, based on their temporal features.
Abstract: A method of verifying the identity of users according to their interaction with a keyboard device of a computer, according to which during a training phase in which a group of users are trained, input streams of keystrokes performed by each of the trained users are recorded and similar pairs of consecutive keystrokes are joined, based on their temporal features. A features vector is then extracted from each input stream of keystrokes, so as to create a user verification model representing the user typing patterns. During a verification phase in which real-time streams of keystrokes are verified, input streams of keystrokes performed by a verified user are recorded and each of the streams is transformed to a features vector. A vector of probabilities indicating the probabilities that the features vector belongs to each user is generated and the stream of keystrokes and associating it with the user with the highest probability is classified.
39 citations
••
TL;DR: In this article, a review of the recent progress in microstructured polymer fiber sensors and compared them to conventional POF is presented, including aqueous biosensors based on surface enhanced Raman spectroscopy (SERS) and surface plasmon resonance (SPR).
Abstract: While polymers are not the traditional materials for optical fibers, polymer optical fibers (POF) have a number of advantages over their glass counterparts for fiber sensors, particularly when coupled range of properties that can be produced using microstructures. This paper reviews some of the recent progress in microstructured polymer fiber sensors and compares them to conventional POF. Sensors considered include mechanical strain sensors and aqueous biosensors based on surface enhanced Raman spectroscopy (SERS) and surface plasmon resonance (SPR).
38 citations
•
28 Mar 1995TL;DR: In this paper, a three-branch tree with two branching levels was used to store the keys for the branches K (2,i) in a decoder Di or a chip card, i having values from 1 to 9.
Abstract: The method could use a three-branch tree with two branching levels, such that the keys for the branches K (2,i) are stored in a decoder Di or a chip card, i having the values from 1 to 9. The root possesses the system key SK = K (O,1), while the keys for the other nodes are given. The keys stored in the decoder serve for decoding the received cryptograms or control words. Each cryptogram can allow a decoder to receive programmes, for example along the branch from K(2,1), through K(1,1) to SK = (0,1), when the decoder is D1 and the key is K(2,1).
38 citations
•
16 Apr 1999TL;DR: In this paper, a system for monitoring wearers of respiratory equipment and to a mobile unit and a base station for using in a system of this type is described. But the system data are continually transmitted to a base-station by a mobile-unit which is fitted to a compressed air breathing apparatus and which has a radio transmitter.
Abstract: The invention relates to a system for monitoring wearers of protective respiratory equipment and to a mobile unit and a base station for using in a system of this type. The aim of the invention is to reduce the risks to wearers of protective respiratory equipment. To this end, system data are continually transmitted to a base station (20) by a mobile unit (21) which is fitted to a compressed air breathing apparatus (22) and which has a radio transmitter (60). The wearer of the protective respiratory equipment and a person monitoring them receive acoustic and/or visual alarm signals and warning signals according to the system data.
38 citations
Authors
Showing all 3475 results
Name | H-index | Papers | Citations |
---|---|---|---|
Jörg Müller | 67 | 407 | 15282 |
Anja Feldmann | 67 | 340 | 17422 |
Yuval Elovici | 62 | 544 | 14451 |
Lior Rokach | 55 | 357 | 19989 |
Pan Hui | 52 | 468 | 17724 |
Hartmut G. Roskos | 50 | 434 | 9643 |
Wolfgang Haase | 50 | 624 | 11634 |
Shlomi Dolev | 48 | 516 | 10435 |
Jean-Pierre Seifert | 45 | 298 | 7516 |
Stefan Schmid | 45 | 561 | 9088 |
Fabian Schneider | 44 | 164 | 7437 |
Karsten Buse | 43 | 394 | 7774 |
Tansu Alpcan | 43 | 293 | 7840 |
Florian Metze | 42 | 318 | 7148 |
Christian Bauckhage | 42 | 285 | 8313 |