Smartphone usage has been continuously increasing in recent years. Moreover, smartphones are often used for privacysensitive tasks, becoming highly valuable targets for attackers....
Georgios Portokalidis, Philip Homburg, Kostas Anag...
Nowadays, due to the lack of face-to-face contact, distance course instructors have real difficulties knowing who their students are, how their students behave in the virtual cour...
We investigate services giving users an adequate insight on his or her energy consumption habits in order to optimize it in the long run. The explored energy awareness services are...
Human emotion is one important underlying force affecting and affected by the dynamics of social networks. An interesting question is "can we predict a person's mood base...
Yuan Zhang, Jie Tang, Jimeng Sun, Yiran Chen, Jing...
Use-after-free vulnerabilities exploiting so-called dangling pointers to deallocated objects are just as dangerous as buffer overflows: they may enable arbitrary code execution. U...