Web applications are the Achilles heel of our current ICT infrastructure. NIST's national vulnerability database clearly shows that the percentage of vulnerabilities located ...
Lieven Desmet, Frank Piessens, Wouter Joosen, Pier...
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
In the last few years, the application of ICT technologies in automotive field has taken an increasing role in improving both the safety and the driving comfort. In this context, s...
Lorenzo Ciardelli, Andrea Beoldo, Francesco Pasini...
Background: High-throughput re-sequencing, new genotyping technologies and the availability of reference genomes allow the extensive characterization of Single Nucleotide Polymorp...
Writer adaptive handwriting recognition, which has potential of increasing accuracies for a particular user, is the process of converting a writer-independent recognition system t...