This paper presents an improvement of the SCMAS architecture aimed at securing SQL-run databases. The main goal of such architecture is the detection and prevention of SQL injectio...
Abstract. We extend our recent work on evaluating incomplete reasoners by introducing strict testing bases. We show how they can be used in practice to identify ontologies and quer...
Giorgos Stoilos, Bernardo Cuenca Grau, Ian Horrock...
We introduce a new representation for monitored behavior of malicious software called Malware Instruction Set (MIST). The representation is optimized for effective and efficient a...
Philipp Trinius, Carsten Willems, Thorsten Holz, K...
Michael Hochman showed that every 1D effectively closed subshift can be simulated by a 3D subshift of finite type and asked whether the same can be done in 2D. It turned out that t...
Bruno Durand, Alexander Shen, Andrei E. Romashchen...
In this paper we present how sharing and utilizing mind maps could enhance search applications such as document search engines and recommender systems. In addition, we briefly pre...