Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Efficient Constraint Verification in Service Composition Design and Execution (Short Paper)

    Most methods that have been proposed to solve the problem of web service composition only consider input and output parameters of services in order to solve the composition problem. However, there are other fa...

    Touraj Laleh, Joey Paquet, Serguei A. Mokhov in On the Move to Meaningful Internet Systems… (2016)

  2. No Access

    Chapter and Conference Paper

    Automating MAC Spoofer Evidence Gathering and Encoding for Investigations

    Following up on the previous work, we elaborate on the details of the design and implementation of the live and dead digital evidence gathering and its encoding into Forensic Lucid by the corresponding MAC Spoofe...

    Serguei A. Mokhov, Michael J. Assels, Joey Paquet in Foundations and Practice of Security (2015)

  3. No Access

    Chapter and Conference Paper

    The Use of NLP Techniques in Static Code Analysis to Detect Weaknesses and Vulnerabilities

    We employ classical NLP techniques (n-grams and various smoothing algorithms) combined with machine learning for non-NLP applications of detection, classification, and reporting of weaknesses related to vulnerabi...

    Serguei A. Mokhov, Joey Paquet, Mourad Debbabi in Advances in Artificial Intelligence (2014)

  4. No Access

    Chapter and Conference Paper

    Reasoning About a Simulated Printer Case Investigation with Forensic Lucid

    In this work we model the ACME (a fictitious company name) “printer case incident” and make its specification in Forensic Lucid, a Lucid- and intensional-logic-based programming language for cyberforensic anal...

    Serguei A. Mokhov, Joey Paquet, Mourad Debbabi in Digital Forensics and Cyber Crime (2012)

  5. No Access

    Chapter and Conference Paper

    Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence

    We apply the theoretical framework and formal model of the observation tuple with the credibility weight for forensic analysis of the IDS data and the corresponding event reconstruction. Forensic Lucid - a for...

    Serguei A. Mokhov, Joey Paquet, Mourad Debbabi in Recent Advances in Intrusion Detection (2010)

  6. No Access

    Chapter and Conference Paper

    Distributed Modular Audio Recognition Framework (DMARF) and its Applications Over Web Services

    In this work we present the software architecture design and implementation of a Distributed Modular Audio Recognition Framework (DMARF), and its applications, such as Speaker Identification, that can run dist...

    Serguei A. Mokhov, Rajagopalan Jayakumar in Novel Algorithms and Techniques in Telecom… (2010)

  7. No Access

    Chapter and Conference Paper

    Writer Identification Using Inexpensive Signal Processing Techniques

    We propose to use novel and classical audio and text signal-processing and otherwise techniques for “inexpensive” fast writer identification tasks of scanned hand-written documents “visually”. The “inexpensive...

    Serguei A. Mokhov, Miao Song, Ching Y. Suen in Innovations in Computing Sciences and Soft… (2010)

  8. No Access

    Chapter and Conference Paper

    Teaching Physical Based Animation via OpenGL Slides

    This work expands further our earlier poster presentation and integration of the OpenGL Slides Framework (OGLSF) – to make presentations with real-time animated graphics where each slide is a scene with tidget...

    Miao Song, Serguei A. Mokhov, Peter Grogono in Innovations in Computing Sciences and Soft… (2010)

  9. No Access

    Chapter and Conference Paper

    Encoding Forensic Multimedia Evidence from MARF Applications as Forensic Lucid Expressions

    In this work we summarize biometric evidence as well as file type evidence extraction “exported” as formal Forensic Lucid language expression in the form of higher-order intensional contexts for further case a...

    Serguei A. Mokhov in Novel Algorithms and Techniques in Telecommunications and Networking (2010)

  10. No Access

    Chapter and Conference Paper

    An OpenGL-based Interface to 3D PowerPoint-like Presentations of OpenGL Projects

    We present a multimedia 3D interface to powerpoint-like presentations in OpenGL. The presentations of such kind are useful to demonstrate projects or conference talks with the demonstration results of a 3D ani...

    Serguei A. Mokhov, Miao Song in Advanced Techniques in Computing Sciences … (2010)

  11. No Access

    Chapter and Conference Paper

    The Authentication Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement

    We present a refinement design of the Authentication Framework, which is a part of a more general structure, that we refer to as Java Data Security Framework (JDSF) designed to support various aspects related ...

    Serguei A. Mokhov, Farid Rassai in Novel Algorithms and Techniques in Telecom… (2010)

  12. No Access

    Chapter and Conference Paper

    The Integrity Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement

    We present a refinement design of the Integrity Framework, which is a part of a more general structure, that we refer to as the Java Data Security Framework (JDSF) designed to support various aspects related t...

    Serguei A. Mokhov, Lee Wei Huynh in Novel Algorithms and Techniques in Telecom… (2010)

  13. No Access

    Chapter and Conference Paper

    Introducing MARF: a Modular Audio Recognition Framework and its Applications for Scientific and Software Engineering Research

    In this paper we introduce a Modular Audio Recognition Framework (MARF), as an open-source research platform implemented in Java. MARF is used to evaluate various pattern-recognition algorithms and beyond in a...

    Serguei A. Mokhov in Advances in Computer and Information Sciences and Engineering (2008)

  14. No Access

    Chapter and Conference Paper

    Choosing Best Algorithm Combinations for Speech Processing Tasks in Machine Learning Using MARF

    This work reports experimental results in various speech processing tasks using an application based on the Modular Audio Recognition Framework (MARF) in terms of the best of the available algorithm configurat...

    Serguei A. Mokhov in Advances in Artificial Intelligence (2008)

  15. No Access

    Chapter and Conference Paper

    Taxonomy of Linux Kernel Vulnerability Solutions

    This paper presents the results of a case study on software vulnerability solutions in the Linux kernel. Our major contribution is the introduction of a classification of methods used to solve vulnerabilities....

    Serguei A. Mokhov, Marc-André Laverdière in Innovative Techniques in Instruction Techn… (2008)