Topic models such as aspect model or LDA have been shown as a promising approach for text modeling. Unlike many previous models that restrict each document to a single topic, topi...
Phishing emails are a real threat to internet communication and web economy. Criminals are trying to convince unsuspecting online users to reveal passwords, account numbers, socia...
Software cache-based side channel attacks present serious threats to modern computer systems. Using caches as a side channel, these attacks are able to derive secret keys used in ...
Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
IT service requirements offer a seemingly classic Requirements Engineering (RE) problem. But, when attempting to solve it with RE methods, we are faced with difficulties. RE metho...
Gil Regev, Olivier Hayard, Donald C. Gause, Alain ...