Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
In this paper, we are interested in the sender's name extraction in fax cover pages through a machine learning scheme. For this purpose, two analysis methods are implemented ...
In this paper, we present an automatic semantic video analysis system to support interdisciplinary research efforts in the field of psychology and media science. The psychological...
The use of machine learning tools is gaining popularity in neuroimaging, as it provides a sensitive assessment of the information conveyed by brain images. In particular, finding ...
Vincent Michel, Evelyn Eger, Christine Keribin, Be...
—Static disassembly is a crucial first step in reverse engineering executable files, and there is a considerable body of work in reverse-engineering of binaries, as well as are...
Nithya Krishnamoorthy, Saumya K. Debray, Keith Fli...