Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Abstract. The description of public resources such as web site contents, web services or data ļ¬les in open peer-to-peer networks using some formal framework like RDF usually reļ¬...
We present an automatic method to disambiguate the senses of the near-synonyms in the entries of a dictionary of synonyms. We combine different indicators that take advantage of th...
By obfuscation we mean any eļ¬cient semantic-preserving transformation of computer programs aimed at bringing a program into such a form, which impedes the understanding of its al...
Abstract. We develop a simple combinatorial algorithm for computing the smallest enclosing ball of a set of points in high dimensional Euclidean space. The resulting code is in mos...