Search
Search Results
-
Tourist eXperience and Use of Virtual Reality, Augmented Reality and Metaverse: A Literature Review
Tourist experience (TX) is considered a specification of the customer experience directly associated with the tourism industry. Researchers agree... -
User Experience Evaluation Methods in Mixed Reality Environments
Interest in the metaverse and telepresence has sparked technological advancements, enabling us to extend our perceived reality with off-the-shelf... -
Tarallo: Evading Behavioral Malware Detectors in the Problem Space
Machine learning algorithms can effectively classify malware through dynamic behavior but are susceptible to adversarial attacks. Existing attacks,... -
S2malloc: Statistically Secure Allocator for Use-After-Free Protection and More
Attacks on heap memory are ever-increasing. Existing entropy-based secure memory allocators can provide statistical defenses against various... -
Using Semgrep OSS to Find OWASP Top 10 Weaknesses in PHP Applications: A Case Study
Given PHP’s continuous success, it remains an important task to ensure security in its applications. While code reviews are a common measure to catch... -
Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks
Despite the increasing effort in the defense community to develop robust security solutions, social engineering attacks are getting more prevalent... -
Extended Abstract: Assessing Language Models for Semantic Textual Similarity in Cybersecurity
In light of the significant strides made by large language models (LLMs) in the field of natural language processing (NLP) [5], our research seeks to... -
Generative AI for Code Generation: Software Reuse Implications
Generative AI has lately started being used in the software engineering process. Developers are relying on ChatGPT, GitHub Copilot or other tools to... -
Using Energy Consumption for Self-adaptation in FaaS
One of the programming models that has been develo** the most in recent years is Function as a Service (FaaS). The growing concern over data centre... -
On Modularity of Neural Networks: Systematic Review and Open Challenges
Modularity is used to manage the complexity of monolithic software systems and is a de facto practice in software engineering. Similar modularity... -
Derivation of Evacuation Routes to Avoid Narrow Road Adopting Physarum Solver
Japan is a country where disasters occur frequently. When disasters occur, people need to escape from their homes to shelters immediately. Thus, it... -
Performance Evaluation of Flood Level Estimation Method Using State-Space Model with Time-Series Monitoring Data
This paper proposes a method for estimating flood levels using a state-space model in order to figure out the time-series changes at locations... -
Situational Disabilities in Emergency Management – Validation of Realistic Scenarios for Training and Awareness-Raising
Situational disabilities and barriers of situational awareness have been shown to be significant potential hinderances to achieving situational... -
TeamAware: Profile-Based Interoperability Framework for First Responders
Many different Command and Control (C2) systems and sensor systems take part in first responder emergency operations. In order to manage these... -
GlueZilla: Efficient and Scalable Software to Hardware Binding using Rowhammer
Industrial-scale reverse engineering affects the majority of companies in the mechanical and plant engineering sector and imposes significant... -
Approach for the Optimization of Machine Learning Models for Calculating Binary Function Similarity
Binary function similarity comparison is essential in a variety of security fields, such as software vulnerability detection and malware analysis,... -
Presshammer: Rowhammer and Rowpress Without Physical Address Information
Modern DRAM is susceptible to fault attacks that undermine the entire system’s security. The most well-studied disturbance effect is Rowhammer, where... -
Using Code from ChatGPT: Finding Patterns in the Developers’ Interaction with ChatGPT
ChatGPT can advise developers and provide code on how to fix bugs, add new features, refactor, reuse, and secure their code but currently, there is... -
Machine Learning Models for Predicting Celiac Disease Based on Non-invasive Clinical Symptoms
Celiac Disease is an autoimmune disease with a prevalence between 1–1.8% worldwide. As it is believed to be highly underdiagnosed, new approaches and... -
MTA-Net: A Multi-task Assisted Network for Whole-Body Lymphoma Segmentation
Lymphoma treatment planning and prognosis assessment require accurate segmentation of lymphoma lesions. Positron emission tomography (PET) /computed...