Network attack graphs are originally used to evaluate what the worst security state is when a concerned net-work is under attack. Combined with intrusion eviden
Electric vehicle has attracted more and more attention all around the world in recent years because of its many advantages such as low pollution to the environm
Recently the number of undesirable messages coming to e-mail has strongly increased. As spam has changeable character the anti-spam systems should be trainable