We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 61-80 of 10,000 results
  1. Tourist eXperience and Use of Virtual Reality, Augmented Reality and Metaverse: A Literature Review

    Tourist experience (TX) is considered a specification of the customer experience directly associated with the tourism industry. Researchers agree...
    Jenny Morales, Héctor Cornide-Reyes, ... Guisselle Muñoz in Social Computing and Social Media
    Conference paper 2024
  2. User Experience Evaluation Methods in Mixed Reality Environments

    Interest in the metaverse and telepresence has sparked technological advancements, enabling us to extend our perceived reality with off-the-shelf...
    Matías García, Jose Requesens, Sandra Cano in Social Computing and Social Media
    Conference paper 2024
  3. Tarallo: Evading Behavioral Malware Detectors in the Problem Space

    Machine learning algorithms can effectively classify malware through dynamic behavior but are susceptible to adversarial attacks. Existing attacks,...
    Gabriele Digregorio, Salvatore Maccarrone, ... Stefano Zanero in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  4. S2malloc: Statistically Secure Allocator for Use-After-Free Protection and More

    Attacks on heap memory are ever-increasing. Existing entropy-based secure memory allocators can provide statistical defenses against various...
    Conference paper 2024
  5. Using Semgrep OSS to Find OWASP Top 10 Weaknesses in PHP Applications: A Case Study

    Given PHP’s continuous success, it remains an important task to ensure security in its applications. While code reviews are a common measure to catch...
    Lukas Kree, René Helmke, Eugen Winter in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  6. Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks

    Despite the increasing effort in the defense community to develop robust security solutions, social engineering attacks are getting more prevalent...
    Mohammad Ali Tofighi, Behzad Ousat, ... Amin Kharraz in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  7. Extended Abstract: Assessing Language Models for Semantic Textual Similarity in Cybersecurity

    In light of the significant strides made by large language models (LLMs) in the field of natural language processing (NLP) [5], our research seeks to...
    Arian Soltani, DJeff Kanda Nkashama, ... Froduald Kabanza in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  8. Generative AI for Code Generation: Software Reuse Implications

    Generative AI has lately started being used in the software engineering process. Developers are relying on ChatGPT, GitHub Copilot or other tools to...
    Georgia M. Kapitsaki in Reuse and Software Quality
    Conference paper 2024
  9. Using Energy Consumption for Self-adaptation in FaaS

    One of the programming models that has been develo** the most in recent years is Function as a Service (FaaS). The growing concern over data centre...
    Pablo Serrano-Gutierrez, Inmaculada Ayala in Reuse and Software Quality
    Conference paper 2024
  10. On Modularity of Neural Networks: Systematic Review and Open Challenges

    Modularity is used to manage the complexity of monolithic software systems and is a de facto practice in software engineering. Similar modularity...
    Riku Alho, Mikko Raatikainen, ... Jukka K. Nurminen in Reuse and Software Quality
    Conference paper 2024
  11. Derivation of Evacuation Routes to Avoid Narrow Road Adopting Physarum Solver

    Japan is a country where disasters occur frequently. When disasters occur, people need to escape from their homes to shelters immediately. Thus, it...
    Rei Fujiwara, Kayoko Yamamoto in Information Technology in Disaster Risk Reduction
    Conference paper 2024
  12. Performance Evaluation of Flood Level Estimation Method Using State-Space Model with Time-Series Monitoring Data

    This paper proposes a method for estimating flood levels using a state-space model in order to figure out the time-series changes at locations...
    Kei Hiroi, Akihito Kohiga, ... Yoichi Shinoda in Information Technology in Disaster Risk Reduction
    Conference paper 2024
  13. Situational Disabilities in Emergency Management – Validation of Realistic Scenarios for Training and Awareness-Raising

    Situational disabilities and barriers of situational awareness have been shown to be significant potential hinderances to achieving situational...
    Terje Gjøsæter, Jaziar Radianti, Weiqin Chen in Information Technology in Disaster Risk Reduction
    Conference paper 2024
  14. TeamAware: Profile-Based Interoperability Framework for First Responders

    Many different Command and Control (C2) systems and sensor systems take part in first responder emergency operations. In order to manage these...
    Yildiray Kabak, Idil Gokalp Kose, ... Dave Ramscar in Information Technology in Disaster Risk Reduction
    Conference paper 2024
  15. GlueZilla: Efficient and Scalable Software to Hardware Binding using Rowhammer

    Industrial-scale reverse engineering affects the majority of companies in the mechanical and plant engineering sector and imposes significant...
    Ruben Mechelinck, Daniel Dorfmeister, ... Stefan Brunthaler in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  16. Approach for the Optimization of Machine Learning Models for Calculating Binary Function Similarity

    Binary function similarity comparison is essential in a variety of security fields, such as software vulnerability detection and malware analysis,...
    Suguru Horimoto, Keane Lucas, Lujo Bauer in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  17. Presshammer: Rowhammer and Rowpress Without Physical Address Information

    Modern DRAM is susceptible to fault attacks that undermine the entire system’s security. The most well-studied disturbance effect is Rowhammer, where...
    Jonas Juffinger, Sudheendra Raghav Neela, ... Daniel Gruss in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  18. Using Code from ChatGPT: Finding Patterns in the Developers’ Interaction with ChatGPT

    ChatGPT can advise developers and provide code on how to fix bugs, add new features, refactor, reuse, and secure their code but currently, there is...
    Anastasia Terzi, Stamatia Bibi, ... Pantelis Angelidis in Reuse and Software Quality
    Conference paper 2024
  19. Machine Learning Models for Predicting Celiac Disease Based on Non-invasive Clinical Symptoms

    Celiac Disease is an autoimmune disease with a prevalence between 1–1.8% worldwide. As it is believed to be highly underdiagnosed, new approaches and...
    Conference paper 2024
  20. MTA-Net: A Multi-task Assisted Network for Whole-Body Lymphoma Segmentation

    Lymphoma treatment planning and prognosis assessment require accurate segmentation of lymphoma lesions. Positron emission tomography (PET) /computed...
    Zhaohai Liang, Jiayi Wu, ... **gmin **n in Artificial Intelligence Applications and Innovations
    Conference paper 2024
Did you find what you were looking for? Share feedback.