Search
Search Results
-
Machine Learning-Based Detection and Categorization of Malicious Accounts on Social Media
In recent years, Online Social Networking (OSN) platforms have become an integral component of people’s lives. The availability of the massive amount... -
Empirical Analysis of Individual Differences Based on Sentiment Estimation Performance Toward Speaker Adaptation for Social Signal Processing
Understanding user’s internal state is indispensable for human-robot interaction in social signal processing. To mitigate the bias of sentiments... -
Relationship Between Consumers’ Circumstances and Food Consumption Behavior
In recent years, food consumption in Japan has changed significantly due to a variety of factors such as imports from over-seas, a declining and... -
Eye Tracking to Evaluate Usability with the Older Adults: A Secondary Study
From 1980 to 2021, a significant increase in the global elderly population has been observed, a trend expected to persist until 2050. In this... -
Tourist eXperience and Use of Virtual Reality, Augmented Reality and Metaverse: A Literature Review
Tourist experience (TX) is considered a specification of the customer experience directly associated with the tourism industry. Researchers agree... -
User Experience Evaluation Methods in Mixed Reality Environments
Interest in the metaverse and telepresence has sparked technological advancements, enabling us to extend our perceived reality with off-the-shelf... -
Tarallo: Evading Behavioral Malware Detectors in the Problem Space
Machine learning algorithms can effectively classify malware through dynamic behavior but are susceptible to adversarial attacks. Existing attacks,... -
S2malloc: Statistically Secure Allocator for Use-After-Free Protection and More
Attacks on heap memory are ever-increasing. Existing entropy-based secure memory allocators can provide statistical defenses against various... -
Using Semgrep OSS to Find OWASP Top 10 Weaknesses in PHP Applications: A Case Study
Given PHP’s continuous success, it remains an important task to ensure security in its applications. While code reviews are a common measure to catch... -
Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks
Despite the increasing effort in the defense community to develop robust security solutions, social engineering attacks are getting more prevalent... -
Extended Abstract: Assessing Language Models for Semantic Textual Similarity in Cybersecurity
In light of the significant strides made by large language models (LLMs) in the field of natural language processing (NLP) [5], our research seeks to... -
A Bigraphs Paper of Sorts
Bigraphs are an expressive graphical modelling formalism to represent systems with a mix of both spatial and non-local connectivity. Currently it is... -
Generative AI for Code Generation: Software Reuse Implications
Generative AI has lately started being used in the software engineering process. Developers are relying on ChatGPT, GitHub Copilot or other tools to... -
Using Energy Consumption for Self-adaptation in FaaS
One of the programming models that has been develo** the most in recent years is Function as a Service (FaaS). The growing concern over data centre... -
On Modularity of Neural Networks: Systematic Review and Open Challenges
Modularity is used to manage the complexity of monolithic software systems and is a de facto practice in software engineering. Similar modularity... -
Derivation of Evacuation Routes to Avoid Narrow Road Adopting Physarum Solver
Japan is a country where disasters occur frequently. When disasters occur, people need to escape from their homes to shelters immediately. Thus, it... -
Performance Evaluation of Flood Level Estimation Method Using State-Space Model with Time-Series Monitoring Data
This paper proposes a method for estimating flood levels using a state-space model in order to figure out the time-series changes at locations... -
Situational Disabilities in Emergency Management – Validation of Realistic Scenarios for Training and Awareness-Raising
Situational disabilities and barriers of situational awareness have been shown to be significant potential hinderances to achieving situational... -
TeamAware: Profile-Based Interoperability Framework for First Responders
Many different Command and Control (C2) systems and sensor systems take part in first responder emergency operations. In order to manage these... -
GlueZilla: Efficient and Scalable Software to Hardware Binding using Rowhammer
Industrial-scale reverse engineering affects the majority of companies in the mechanical and plant engineering sector and imposes significant...