Although there is a large body of research on detection and prevention of such memory corruption attacks as buffer overflow, integer overflow, and format string attacks, the web...
In this article, we extend a local prototype-based learning model by active learning, which gives the learner the capability to select training samples during the model adaptation...
Frank-Michael Schleif, Barbara Hammer, Thomas Vill...
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
Alerting for Digital Libraries (DL) is an important and useful feature for the library users. To date, two independent services and a few publisher-hosted proprietary services hav...
: With the advent of Optical Networks, an important opportunity for the application of Telecommunication Management Network (TMN) framework emerges. At present, most such networks ...
Abilio Carvalho, Fausto de Carvalho, George Pavlou