Human–robot interactions require the ability of the system to determine if the user is paying attention. However, to train such systems, massive amounts of data are required. In this …
This book focuses on the different aspects of handling big data in healthcare. It showcases the current state-of-the-art technology used for storing health records and health data …
Y Ji, S Lee, W Lee - Provenance and Annotation of Data and Processes …, 2016 - Springer
Deterministic record and replay systems have widely been used in software debugging, failure diagnosis, and intrusion detection. In order to detect the Advanced Persistent Threat …
SK Sah, LK Sah - 2024 IEEE 67th International Midwest …, 2024 - ieeexplore.ieee.org
In this study, we instrumented runtime instructions to extract real-time memory addresses of program variables, constructing a table as a tool to enforce back-edge control flow integrity …
A file's provenance is a detailing of its origins and activities. There are tools available that are useful in maintaining the provenance of a file. Unfortunately for digital forensics, these …
In the past 25 years, the World Wide Web has disrupted the way news are disseminated and consumed. However, the euphoria for the democratization of news publishing was soon …
In recent years, exposure to fake news has become a global phenomenon. The shift to digital news distribution over the World Wide Web is a major contributing factor to this trend …
This paper presents PT-CFI, a new backward-edge control flow integrity (CFI) based on a recently introduced hardware feature in Intel x86 called Processor Trace (PT). Designed …