Lightweight collaborative anomaly detection for the IoT using blockchain

Y Mirsky, T Golomb, Y Elovici - Journal of Parallel and Distributed …, 2020 - Elsevier
Due to their rapid growth and deployment, the Internet of things (IoT) have become a central
aspect of our daily lives. Unfortunately, IoT devices tend to have many vulnerabilities which …

Analyzing state sequences with probabilistic suffix trees: The PST R package

A Gabadinho, G Ritschard - Journal of statistical software, 2016 - jstatsoft.org
This article presents the PST R package for categorical sequence analysis with probabilistic
suffix trees (PSTs), ie, structures that store variable-length Markov chains (VLMCs). VLMCs …

Estimating types in binaries using predictive modeling

O Katz, R El-Yaniv, E Yahav - ACM SIGPLAN Notices, 2016 - dl.acm.org
Reverse engineering is an important tool in mitigating vulnerabilities in binaries. As a lot of
software is developed in object-oriented languages, reverse engineering of object-oriented …

Mining group movement patterns for tracking moving objects efficiently

HP Tsai, DN Yang, MS Chen - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
Existing object tracking applications focus on finding the moving patterns of a single object
or all objects. In contrast, we propose a distributed mining algorithm that identifies a group of …

Statistical reconstruction of class hierarchies in binaries

O Katz, N Rinetzky, E Yahav - Proceedings of the Twenty-Third …, 2018 - dl.acm.org
We address a fundamental problem in reverse engineering of object-oriented code: the
reconstruction of a program's class hierarchy from its stripped binary. Existing approaches …

Radmin: early detection of application-level resource exhaustion and starvation attacks

M Elsabagh, D Barbará, D Fleck, A Stavrou - Research in Attacks …, 2015 - Springer
Software systems are often engineered and tested for functionality under normal rather than
worst-case conditions. This makes the systems vulnerable to denial of service attacks, where …

An irregular approach to large-scale computed tomography on multiple graphics processors improves voxel processing throughput

ES Jimenez, LJ Orr… - 2012 SC Companion: High …, 2012 - ieeexplore.ieee.org
While much work has been done on applying GPU technology to computed tomography
(CT) reconstruction algorithms, many of these implementations focus on smaller datasets …

On early detection of application-level resource exhaustion and starvation

M Elsabagh, D Barbará, D Fleck, A Stavrou - Journal of Systems and …, 2018 - Elsevier
Software systems are often engineered and tested for functionality under normal rather than
worst-case conditions. This makes the systems vulnerable to denial-of-service attacks …

Probabilistic suffix array: efficient modeling and prediction of protein families

J Lin, D Adjeroh, BH Jiang - Bioinformatics, 2012 - academic.oup.com
Motivation: Markov models are very popular for analyzing complex sequences such as
protein sequences, whose sources are unknown, or whose underlying statistical …

Monitoring the Environmental Impact of TiO Nanoparticles Using a Plant-Based Sensor Network

SC Lenaghan, Y Li, H Zhang, JN Burris… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
The increased manufacturing of nanoparticles for use in cosmetics, foods, and clothing
necessitates the need for an effective system to monitor and evaluate the potential …