Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
When automatic speech recognition (ASR) and speaker verification (SV) are applied in adverse acoustic environments, endpoint detection and energy normalization can be crucial to th...
As military interest continues to grow for Unmanned Aerial Vehicle (UAV) capabilities, the Air Force is exploring UAV autonomous control, mission planning and optimization techniq...
The military environment is changing, e.g., the operating environment is becoming more varied and demanding. Due to these challenges, new user interfaces (UIs) are required providi...
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...