Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
This paper describes a research project concentrating on improving requirements management. We started this research by identifying the problems companies face with respect to req...
In this work, we present the novel idea of route normalization by correcting on the fly routing traffic on behalf of a local router to protect the local network from malicious a...
Sketch-based interaction is an intuitive, simple communication method. However, it has several critical aspects, due to difficulties during the interpretation step by the computer...
Danilo Avola, Maria Chiara Caschera, Fernando Ferr...
In this paper, we present a knowledge-assisted approach to index and retrieve large volume of medical images. Both images and associated texts are indexed using medical concepts f...