Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
The present paper reports a comparative evaluation of four multivariate statistical process control (SPC) techniques for the on-line monitoring of an industrial sugar crystallizat...
A. Simoglou, Petia Georgieva, E. B. Martin, A. J. ...
Static checking can verify the absence of errors in a program, but often requires written annotations or specifications. As a result, static checking can be difficult to use effec...
Stemming from a sound mathematical framework dating back to the beginning of the 20th century, this paper introduces a novel approach for 3D face recognition. The proposed techniqu...
Stroke is a major cause of disability and health care expenditure around the world. Existing stroke rehabilitation methods can be effective but are costly and need to be improved....
Ahmed Ghali, Andrew S. Cunningham, Tony P. Pridmor...