Abstract: The security of a dynamic ID-based remote user authentication scheme for multiserver environment using smart cards proposed by Lee et al. [Lee, C-C., Lin, T-H., Chang, R-...
Radiotherapy planning is a complex problem which requires both expertise and experience of an oncologist. A Case Based Reasoning (CBR) system is developed to generate dose plans f...
The class of Cross-site Scripting (XSS) vulnerabilities is the most prevalent security problem in the field of Web applications. One of the main attack vectors used in connection ...
Nick Nikiforakis, Wannes Meert, Yves Younan, Marti...
Abstract. The security requirements of complex multi-tier web applications have shifted from simple localized needs, such as authentication or authorization, to physically distribu...
Abstract. Today, software security is an issue with increasing importance. Developers, software designers, end users, and enterprises have their own needs w.r.t. software security....
The feedback from architectural decisions to the elaboration of requirements is an established concept in the software engineering community. However, pinpointing the nature of thi...
Thomas Heyman, Koen Yskout, Riccardo Scandariato, ...
Abstract. Dependent grammars extend context-free grammars by allowing semantic values to be bound to variables and used to constrain parsing. Dependent grammars can cleanly specify...
Programs written in scripting languages employ idioms that confound conventional type systems. In this paper, we highlight one important set of related idioms: the use of local con...