We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 61-80 of 10,000 results
  1. Machine Learning-Based Detection and Categorization of Malicious Accounts on Social Media

    In recent years, Online Social Networking (OSN) platforms have become an integral component of people’s lives. The availability of the massive amount...
    Ajay Bhattacharyya, Adita Kulkarni in Social Computing and Social Media
    Conference paper 2024
  2. Empirical Analysis of Individual Differences Based on Sentiment Estimation Performance Toward Speaker Adaptation for Social Signal Processing

    Understanding user’s internal state is indispensable for human-robot interaction in social signal processing. To mitigate the bias of sentiments...
    Sixia Li, Shogo Okada in Social Computing and Social Media
    Conference paper 2024
  3. Relationship Between Consumers’ Circumstances and Food Consumption Behavior

    In recent years, food consumption in Japan has changed significantly due to a variety of factors such as imports from over-seas, a declining and...
    Aina Ishikawa, Takashi Namatame, Kohei Otake in Social Computing and Social Media
    Conference paper 2024
  4. Eye Tracking to Evaluate Usability with the Older Adults: A Secondary Study

    From 1980 to 2021, a significant increase in the global elderly population has been observed, a trend expected to persist until 2050. In this...
    John W. Castro, Gianina Madrigal, Luis A. Rojas in Social Computing and Social Media
    Conference paper 2024
  5. Tourist eXperience and Use of Virtual Reality, Augmented Reality and Metaverse: A Literature Review

    Tourist experience (TX) is considered a specification of the customer experience directly associated with the tourism industry. Researchers agree...
    Jenny Morales, Héctor Cornide-Reyes, ... Guisselle Muñoz in Social Computing and Social Media
    Conference paper 2024
  6. User Experience Evaluation Methods in Mixed Reality Environments

    Interest in the metaverse and telepresence has sparked technological advancements, enabling us to extend our perceived reality with off-the-shelf...
    Matías García, Jose Requesens, Sandra Cano in Social Computing and Social Media
    Conference paper 2024
  7. Tarallo: Evading Behavioral Malware Detectors in the Problem Space

    Machine learning algorithms can effectively classify malware through dynamic behavior but are susceptible to adversarial attacks. Existing attacks,...
    Gabriele Digregorio, Salvatore Maccarrone, ... Stefano Zanero in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  8. S2malloc: Statistically Secure Allocator for Use-After-Free Protection and More

    Attacks on heap memory are ever-increasing. Existing entropy-based secure memory allocators can provide statistical defenses against various...
    Conference paper 2024
  9. Using Semgrep OSS to Find OWASP Top 10 Weaknesses in PHP Applications: A Case Study

    Given PHP’s continuous success, it remains an important task to ensure security in its applications. While code reviews are a common measure to catch...
    Lukas Kree, René Helmke, Eugen Winter in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  10. Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks

    Despite the increasing effort in the defense community to develop robust security solutions, social engineering attacks are getting more prevalent...
    Mohammad Ali Tofighi, Behzad Ousat, ... Amin Kharraz in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  11. Extended Abstract: Assessing Language Models for Semantic Textual Similarity in Cybersecurity

    In light of the significant strides made by large language models (LLMs) in the field of natural language processing (NLP) [5], our research seeks to...
    Arian Soltani, DJeff Kanda Nkashama, ... Froduald Kabanza in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  12. A Bigraphs Paper of Sorts

    Bigraphs are an expressive graphical modelling formalism to represent systems with a mix of both spatial and non-local connectivity. Currently it is...
    Blair Archibald, Michele Sevegnani in Graph Transformation
    Conference paper 2024
  13. Generative AI for Code Generation: Software Reuse Implications

    Generative AI has lately started being used in the software engineering process. Developers are relying on ChatGPT, GitHub Copilot or other tools to...
    Georgia M. Kapitsaki in Reuse and Software Quality
    Conference paper 2024
  14. Using Energy Consumption for Self-adaptation in FaaS

    One of the programming models that has been develo** the most in recent years is Function as a Service (FaaS). The growing concern over data centre...
    Pablo Serrano-Gutierrez, Inmaculada Ayala in Reuse and Software Quality
    Conference paper 2024
  15. On Modularity of Neural Networks: Systematic Review and Open Challenges

    Modularity is used to manage the complexity of monolithic software systems and is a de facto practice in software engineering. Similar modularity...
    Riku Alho, Mikko Raatikainen, ... Jukka K. Nurminen in Reuse and Software Quality
    Conference paper 2024
  16. Derivation of Evacuation Routes to Avoid Narrow Road Adopting Physarum Solver

    Japan is a country where disasters occur frequently. When disasters occur, people need to escape from their homes to shelters immediately. Thus, it...
    Rei Fujiwara, Kayoko Yamamoto in Information Technology in Disaster Risk Reduction
    Conference paper 2024
  17. Performance Evaluation of Flood Level Estimation Method Using State-Space Model with Time-Series Monitoring Data

    This paper proposes a method for estimating flood levels using a state-space model in order to figure out the time-series changes at locations...
    Kei Hiroi, Akihito Kohiga, ... Yoichi Shinoda in Information Technology in Disaster Risk Reduction
    Conference paper 2024
  18. Situational Disabilities in Emergency Management – Validation of Realistic Scenarios for Training and Awareness-Raising

    Situational disabilities and barriers of situational awareness have been shown to be significant potential hinderances to achieving situational...
    Terje Gjøsæter, Jaziar Radianti, Weiqin Chen in Information Technology in Disaster Risk Reduction
    Conference paper 2024
  19. TeamAware: Profile-Based Interoperability Framework for First Responders

    Many different Command and Control (C2) systems and sensor systems take part in first responder emergency operations. In order to manage these...
    Yildiray Kabak, Idil Gokalp Kose, ... Dave Ramscar in Information Technology in Disaster Risk Reduction
    Conference paper 2024
  20. GlueZilla: Efficient and Scalable Software to Hardware Binding using Rowhammer

    Industrial-scale reverse engineering affects the majority of companies in the mechanical and plant engineering sector and imposes significant...
    Ruben Mechelinck, Daniel Dorfmeister, ... Stefan Brunthaler in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
Did you find what you were looking for? Share feedback.