Abstract. We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the analysis of cryptographic prot...
This paper explores the application of wearable computer systems to threat response, exemplified by the Multi-functional Micro-controllable Interface Module (MMIM)/Digital Militar...
Noa M. Rensing, Evan Weststrate, Paul M. Zavracky,...
We describe an algorithm for automatically learning discriminative components of objects with SVM classifiers. It is based on growing image parts by minimizing theoretical bounds ...
Bernd Heisele, Thomas Serre, Massimiliano Pontil, ...
The paper describes a simple but effective framework for visual object tracking in video sequences. The main contribution of this work lies in the introduction of a case-based rea...
Security vendors are facing a serious problem of defeating the complexity of malwares. With the popularity and the variety of zeroday malware over the Internet, generating their si...