Search
Search Results
-
MatchCom: Stable Matching-Based Software Services Composition in Cloud Computing Environments
User preferences on throughput, latency, cost, service location, etc. indicate specific requirements when choosing a web service from the cloud... -
AuthApp – Portable, Reusable Solid App for GDPR-Compliant Access Granting
The Solid (Social Linked Data) technology family was developed to provide the foundation for Data Sovereignty in the context of web applications. The... -
Streamlining Vocabulary Conversion to SKOS: A YAML-Based Approach to Facilitate Participation in the Semantic Web
Controlled vocabularies, such as classification schemes, glossaries, taxonomies, or thesauri, play an important role in many Web services. One of the... -
AutoMaster: Differentiable Graph Neural Network Architecture Search for Collaborative Filtering Recommendation
Graph Neural Networks (GNNs) have been widely applied in Collaborative Filtering (CF) and have demonstrated powerful capabilities in recommender... -
Investigating the Usefulness of Product Reviews Through Bipolar Argumentation Frameworks
The importance of useful product reviews cannot be overstated, as they not only provide crucial information to potential buyers but also offer... -
GitHub-Sourced Web API Evolution: A Large-Scale OpenAPI Dataset
This study presents a dataset curated using a software tool called the crawler, which gathers OpenAPI Specifications (OAS) from GitHub. The crawler... -
A Prototype Design of LLM-Based Autonomous Web Crowdsensing
The expanded demands of complex sensing campaigns involving Cyber-Physical-Social spaces have brought forth a multitude of challenges for web... -
Overview of Serendipity in Recommender Systems
Has it ever happened to you that services like Spotify, Netflix or YouTube showed you recommendations on the same topic over and over again? This... -
Leveraging Digital Trace Data to Investigate and Support Human-Centered Work Processes
The ongoing digitization of processes in all domains of everyday life driven by IT systems shows great potential for process automation, analysis,... -
Dynamic Data-Flow Analysis with Dacite: Evaluating an Integrated Data-Flow Visualization Approach
According to different studies, analyzing the data-flow coverage when testing programs is a highly effective approach to ensure software quality.... -
Tarallo: Evading Behavioral Malware Detectors in the Problem Space
Machine learning algorithms can effectively classify malware through dynamic behavior but are susceptible to adversarial attacks. Existing attacks,... -
S2malloc: Statistically Secure Allocator for Use-After-Free Protection and More
Attacks on heap memory are ever-increasing. Existing entropy-based secure memory allocators can provide statistical defenses against various... -
Using Semgrep OSS to Find OWASP Top 10 Weaknesses in PHP Applications: A Case Study
Given PHP’s continuous success, it remains an important task to ensure security in its applications. While code reviews are a common measure to catch... -
Impact Analysis of Disruptions on Composite Resources
This paper examines the impact of disruptions on the ongoing consumption of composite resources assigned to jobs. Composite resources are defined... -
Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks
Despite the increasing effort in the defense community to develop robust security solutions, social engineering attacks are getting more prevalent... -
Extended Abstract: Assessing Language Models for Semantic Textual Similarity in Cybersecurity
In light of the significant strides made by large language models (LLMs) in the field of natural language processing (NLP) [5], our research seeks to... -
Enhancing Software Defect Prediction: Exploring the Predictive Power of Two Data Flow Metrics
Data flow coverage criteria find extensive application in software testing, yet scant research exists regarding low-level data flow metrics as... -
Requirements Elicitation in the Age of AI: A Tool’s Multi-system Journey
Traditional Requirements Engineering (RE) practices have introduced new tools to elicit and model requirements. Applying these tools to building AI... -
GlueZilla: Efficient and Scalable Software to Hardware Binding using Rowhammer
Industrial-scale reverse engineering affects the majority of companies in the mechanical and plant engineering sector and imposes significant... -
Approach for the Optimization of Machine Learning Models for Calculating Binary Function Similarity
Binary function similarity comparison is essential in a variety of security fields, such as software vulnerability detection and malware analysis,...