: Web services are generally accepted as the most interoperable application interface today on the Web. In the context of a global electronic marketplace this is an essential facto...
We present the architecture of an automatic early warning system (EWS) that aims at providing predictions and advice regarding security threats in information and communication tec...
Martin Apel, Joachim Biskup, Ulrich Flegel, Michae...
This article improves recent methods for large scale image search. We first analyze the bag-of-features approach in the framework of approximate nearest neighbor search. This lea...
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...