Search results
-
-
Title
-
A LANGUAGE-BASED APPROACH FOR SECURING ACTIONSCRIPT/FLASH VULNERABILITIES
-
Author
-
Yilmaz, Fadi
-
Date Created
-
2020
-
Subjects--Topical
-
Computer science
-
Description
-
Web technologies enable web users to share files, images, audios, videos with each other worldwide. The accessibility provided by the web lures web pirates to perform unauthorized, malicious activities in victim machines remotely by exploiting des...
-
-
Title
-
AUTOMATIC UNIT TESTING TO DETECT SECURITY VULNERABILITIES IN WEB APPLICATIONS
-
Author
-
Mohammadi, Mahmoud
-
Date Created
-
2018
-
Subjects--Topical
-
Computer science
-
Description
-
Web applications consume data from different inputs. Some of these inputs originate from untrusted sources, such as user inputs which will be rendered in browsers or browser-based applications such as mobile apps. Many applications with these func...
-
-
Title
-
An Approach Towards an Autonomic Computing Prototype Reference Architecture
-
Author
-
Williams, Trevon
-
Date Created
-
2019
-
Subjects--Topical
-
Computer science, Information technology, System theory
-
Description
-
Autonomic Computing is a grand challenge that strives to create self-regulating environments. The end goal, is to create an environment that can self-optimize, self-protect, self-heal and self-configure based on built-in, formulated, and generated...
-
-
Title
-
Building an Efficient and Scalable Learning System on Heterogeneous Cluster
-
Author
-
Yang, Donglin
-
Date Created
-
2022
-
Subjects--Topical
-
Computer science
-
Description
-
Deep Learning (DL) has been widely applied in both academia and industry. System innovations can continue to squeeze more efficiency out of modern hardware. Existing systems such as TensorFlow, MXNet, and PyTorch have emerged to assist researchers...
-
-
Title
-
Deep Structured Learning in Medical Image Analysis
-
Author
-
Kong, Bin
-
Date Created
-
2020
-
Subjects--Topical
-
Artificial intelligence, Diagnostic imaging
-
Description
-
Deep learning-based techniques have been widely employed in solving various medical image analytical problems. Currently, most of these methods directly employ deep architectures from natural image scenarios without considering the specific struct...
-
-
Title
-
Discovering Zero-day Attacks By Leveraging Cyber Threat Intelligence
-
Author
-
Niakanlahiji, Amirreza
-
Date Created
-
2019
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Cyber attacks cost companies and organizations billions of dollars each year. To alleviate this issue, security professionals and companies continuously attempt to discover new vulnerabilities, and also to share their cyber threat information abou...
-
-
Title
-
Evaluating Co-Creation In Collaborative Drawing Using Creative Thinking Modes
-
Author
-
Algarni, Ali
-
Date Created
-
2022
-
Subjects--Topical
-
Computer science
-
Description
-
Co-creation is a form of collaboration in which partners share, improve and blend ideas together to develop a creative product. It helps to share ideas and solve problems in a creative manner. Several co-creativity research works have focused on g...
-
-
Title
-
Fast and Energy-Efficient Mobility Management in Mobile Edge Computing Networks
-
Author
-
Wang, Haoxin
-
Date Created
-
2020
-
Subjects--Topical
-
Computer science, Communication, Computer engineering
-
Description
-
The prevalence of computation-intensive and latency-sensitive mobile applications, such as mobile augmented reality (MAR) and autonomous driving, has an utmost effect on resource-limited mobile clients. Mobile edge computing (MEC) is proposed to b...
-
-
Title
-
HYBRID COMPARATIVE PREDICTIVE MODELING
-
Author
-
Nawaz, Mohammad
-
Date Created
-
2017
-
Subjects--Topical
-
Information technology
-
Description
-
In this research, a hybrid predictive model was proposed for the decision-making process. Predictive models can be built through the use of Machine Learning using different classifiers/algorithms to predict results as well as provide recommendatio...
-
-
Title
-
Intrusion Detection and Deterrence for Critical Infrastructures
-
Author
-
Ali, Muhammad
-
Date Created
-
2016
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Critical infrastructures are the systems and networks that are so vital that their unavailability would have a major impact on national security, economy, safety, or any combination thereof. Examples of critical infrastructure are power systems, f...
-
-
Title
-
MULTIMODAL VISUALIZATION USING AUGMENTED REALITY AND LARGE DISPLAYS
-
Author
-
Butler, Erik
-
Date Created
-
2017
-
Subjects--Topical
-
Computer science
-
Description
-
We are living in an age where technology has allowed data collection to encompass every aspect of our day to day lives. With quintillions of bits of data being created daily, we are under constant pressure to advance our supercomputers and machine...
-
-
Title
-
Modeling Twitter Data for Effective Dissemination of Health-related Information
-
Author
-
Safarnejad, Lida
-
Date Created
-
2020
-
Subjects--Topical
-
Computer science
-
Description
-
Social media platforms, such as Twitter, are attracting a growing number of people with diverse demographic characteristics to share and obtain information about various topics. As a result, these platforms have become one of the main targets for ...
-
-
Title
-
PARTICIPANT SELECTION AND TASK ASSIGNMENT IN MOBILE CROWD SENSING
-
Author
-
Li, Hanshang
-
Date Created
-
2018
-
Subjects--Topical
-
Computer science
-
Description
-
With the rapid increasing of smart mobile devices and the advances of sensing technologies, mobile crowd sensing (MCS) becomes a new popular sensing paradigm, which enables a variety of large-scale sensing applications. One of the key challenges o...