-
Article
Network malware classification comparison using DPI and flow packet headers
In order to counter cyber-attacks and digital threats, security experts must generate, share, and exploit cyber-threat intelligence generated from malware. In this research, we address the problem of fingerpri...
-
Chapter and Conference Paper
Efficient Constraint Verification in Service Composition Design and Execution (Short Paper)
Most methods that have been proposed to solve the problem of web service composition only consider input and output parameters of services in order to solve the composition problem. However, there are other fa...
-
Chapter and Conference Paper
Automating MAC Spoofer Evidence Gathering and Encoding for Investigations
Following up on the previous work, we elaborate on the details of the design and implementation of the live and dead digital evidence gathering and its encoding into Forensic Lucid by the corresponding MAC Spoofe...
-
Chapter and Conference Paper
The Use of NLP Techniques in Static Code Analysis to Detect Weaknesses and Vulnerabilities
We employ classical NLP techniques (n-grams and various smoothing algorithms) combined with machine learning for non-NLP applications of detection, classification, and reporting of weaknesses related to vulnerabi...
-
Chapter
Develo** Autonomic Properties for Distributed Pattern-Recognition Systems with ASSL
We discuss our research towards develo** special properties that introduce autonomic behavior in distributed pattern-recognition systems. In our approach we use ASSL (Autonomic System Specification Language)...
-
Chapter and Conference Paper
Reasoning About a Simulated Printer Case Investigation with Forensic Lucid
In this work we model the ACME (a fictitious company name) “printer case incident” and make its specification in Forensic Lucid, a Lucid- and intensional-logic-based programming language for cyberforensic anal...
-
Chapter and Conference Paper
Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence
We apply the theoretical framework and formal model of the observation tuple with the credibility weight for forensic analysis of the IDS data and the corresponding event reconstruction. Forensic Lucid - a for...
-
Chapter
Towards Autonomic Specification of Distributed MARF with ASSL: Self-healing
In this paper, we discuss our work towards self-healing property specification of an autonomic behavior in the Distributed Modular Audio Recognition Framework (DMARF) by using the Autonomic System Specificatio...
-
Chapter and Conference Paper
Distributed Modular Audio Recognition Framework (DMARF) and its Applications Over Web Services
In this work we present the software architecture design and implementation of a Distributed Modular Audio Recognition Framework (DMARF), and its applications, such as Speaker Identification, that can run dist...
-
Chapter and Conference Paper
Writer Identification Using Inexpensive Signal Processing Techniques
We propose to use novel and classical audio and text signal-processing and otherwise techniques for “inexpensive” fast writer identification tasks of scanned hand-written documents “visually”. The “inexpensive...
-
Chapter and Conference Paper
Teaching Physical Based Animation via OpenGL Slides
This work expands further our earlier poster presentation and integration of the OpenGL Slides Framework (OGLSF) – to make presentations with real-time animated graphics where each slide is a scene with tidget...
-
Chapter and Conference Paper
Encoding Forensic Multimedia Evidence from MARF Applications as Forensic Lucid Expressions
In this work we summarize biometric evidence as well as file type evidence extraction “exported” as formal Forensic Lucid language expression in the form of higher-order intensional contexts for further case a...
-
Chapter and Conference Paper
An OpenGL-based Interface to 3D PowerPoint-like Presentations of OpenGL Projects
We present a multimedia 3D interface to powerpoint-like presentations in OpenGL. The presentations of such kind are useful to demonstrate projects or conference talks with the demonstration results of a 3D ani...
-
Chapter and Conference Paper
The Authentication Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement
We present a refinement design of the Authentication Framework, which is a part of a more general structure, that we refer to as Java Data Security Framework (JDSF) designed to support various aspects related ...
-
Chapter and Conference Paper
The Integrity Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement
We present a refinement design of the Integrity Framework, which is a part of a more general structure, that we refer to as the Java Data Security Framework (JDSF) designed to support various aspects related t...
-
Chapter and Conference Paper
Introducing MARF: a Modular Audio Recognition Framework and its Applications for Scientific and Software Engineering Research
In this paper we introduce a Modular Audio Recognition Framework (MARF), as an open-source research platform implemented in Java. MARF is used to evaluate various pattern-recognition algorithms and beyond in a...
-
Chapter and Conference Paper
Choosing Best Algorithm Combinations for Speech Processing Tasks in Machine Learning Using MARF
This work reports experimental results in various speech processing tasks using an application based on the Modular Audio Recognition Framework (MARF) in terms of the best of the available algorithm configurat...
-
Chapter and Conference Paper
Taxonomy of Linux Kernel Vulnerability Solutions
This paper presents the results of a case study on software vulnerability solutions in the Linux kernel. Our major contribution is the introduction of a classification of methods used to solve vulnerabilities....