Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleSeptember 2023
“Is Proton Good Enough?” - A Performance Comparison Between Gaming on Windows and Linux
AbstractIn this paper a performance comparison of Proton - a Linux-based compatibility layer - and native Windows is carried out for the purpose of video gaming. Proton, being a fork project of Wine, is a compatibility layer and just as Wine allows to run ...
- ArticleJuly 2023
Towards Improving the Efficacy of Windows Security Notifier for Apps from Unknown Publishers: The Role of Rhetoric
AbstractWith over 1.4 billion users of Windows 10, it is the most widely used operating system in the world. In Windows, applications from unknown publishers are popular due to mass availability and ease of access. Installing such applications can lead to ...
- invited-talkApril 2023
Why are Hyperlinks Blue?: A deep dive into browser hyperlink color history
WWW '23 Companion: Companion Proceedings of the ACM Web Conference 2023Pages 633–641https://doi.org/10.1145/3543873.3587714The internet has ingrained itself into every aspect of our lives, but there's one aspect of the digital world that some take for granted. Did you ever notice that many links, specifically hyperlinks, are blue? When a coworker casually asked me why links ...
- research-articleJanuary 2023
An experimental approach for locating WhatsApp digital forensics artefacts on Windows 10 and the cloud
International Journal of Electronic Security and Digital Forensics (IJESDF), Volume 15, Issue 3Pages 281–300https://doi.org/10.1504/ijesdf.2023.130662The increased popularity of WhatsApp resulted in its extensive use as a tool in planning unlawful activities. In order to conduct an investigation in WhatsApp, the WhatsApp artefact should be located. This poses challenges to digital forensic ...
- research-articleNovember 2022
MinSIB: Minimized static instrumentation for fuzzing binaries
AbstractCode instrumentation is widely used in software analysis. The coverage-guided fuzzers collect path information by instrumenting additional code into the executable to guide the mutator. Existing instrumentation tools try to instrument ...
-
- ArticleFebruary 2023
Window Size Selection in Unsupervised Time Series Analytics: A Review and Benchmark
Advanced Analytics and Learning on Temporal DataPages 83–101https://doi.org/10.1007/978-3-031-24378-3_6AbstractTime series (TS) are sequences of values ordered in time. Such TS have in common, that important insights from the data can be drawn by inspecting local substructures, and not the recordings as a whole. ECG recordings, for instance, are ...
- articleApril 2022
Multi-Platform Application to Explore Avalanche Information for Bahang Region
International Journal of Software Innovation (IJSI), Volume 10, Issue 1Pages 1–9https://doi.org/10.4018/IJSI.297918Avalanche is a common disaster occurring in the hilly regions. It is unsafe for the people residing and the adventure enthusiast that are present in such regions. Avalanche forecasting helps people to take any precautionary measures against high risk. It ...
- research-articleJanuary 2022
A Novel Approach towards Windows Malware Detection System Using Deep Neural Networks
Procedia Computer Science (PROCS), Volume 215, Issue CPages 148–157https://doi.org/10.1016/j.procs.2022.12.017AbstractNow-a-day's malicious software is increasing in numbers and at present becomes more harmful for any digital equipment like mobile, tablet, and computers. Traditional techniques like static and dynamic analysis, signature-based detection methods ...
- research-articleDecember 2021
Malbert: A novel pre-training method for malware detection
AbstractMicrosoft’s Windows desktop operating system has been the most popular operating system in the domain of personal computers in recent years. The popularity of this system has also led to a large amount of malware on the Windows platform. With the ...
- posterDecember 2019
Data-Driven Windows to Accelerate Video Stream Content Extraction in Complex Event Processing
Middleware '19: Proceedings of the 20th International Middleware Conference Demos and PostersPages 15–16https://doi.org/10.1145/3366627.3368115This work presents a data-driven adaptive windowing approach to accelerate video content extraction in DNN-based Complex Event Processing (CEP) systems. The CEP windows continuously monitor low-level content of incoming video frames and exploit ...
- ArticleOctober 2019
Exploring the Use of Immersive Virtual Reality to Assess the Impact of Outdoor Views on the Perceived Size and Spaciousness of Architectural Interiors
AbstractIt has been widely reported that rooms with larger windows tend to feel more spacious, and previous studies have found a significant impact of the particular external view that a window affords on people’s preferences for its size and shape. ...
- extended-abstractJuly 2019
Streamlining Simulation and Data Transfer in a Heterogeneous Environment
PEARC '19: Practice and Experience in Advanced Research Computing 2019: Rise of the Machines (learning)Article No.: 122, Pages 1–3https://doi.org/10.1145/3332186.3335199Our research uses ANSYS Maxwell for finite element analysis of electromagnetic devices. Our studies use heavily parameterized models to analyze numerous design scenarios and operating points, resulting in hundreds and thousands of simulation cases. ...
- research-articleJuly 2019
Research Computing at a Business University
PEARC '19: Practice and Experience in Advanced Research Computing 2019: Rise of the Machines (learning)Article No.: 117, Pages 1–5https://doi.org/10.1145/3332186.3333161Research Computing demands are exploding beyond traditional disciplines due to the proliferation of data in all walks of life. At Bentley University ("Bentley"), a business university in the Boston area, this expansion has been most readily seen in our ...
- research-articleJuly 2019
Windows Memory Forensics: Detecting (Un)Intentionally Hidden Injected Code by Examining Page Table Entries
Digital Investigation: The International Journal of Digital Forensics & Incident Response (DIGITI), Volume 29, Issue SPages S3–S12https://doi.org/10.1016/j.diin.2019.04.008AbstractMalware utilizes code injection techniques to either manipulate other processes (e.g. done by banking trojans) or hide its existence. With some exceptions, such as ROP gadgets, the injected code needs to be executable by the CPU (at ...
- research-articleDecember 2017
Disaster recovery plan for medical records company
International Journal of Information Management: The Journal for Information Professionals (IJIM), Volume 37, Issue 6Pages 622–626https://doi.org/10.1016/j.ijinfomgt.2017.05.015Computer systems have become a critical part of many businesses. Businesses rely on computer systems to perform many daily tasks. It is important that businesses have a valid strategy to recover their data in the event of fires, hurricanes, other ...
- research-articleAugust 2016
Measurement Based Fair Queuing for Allocating Bandwidth to Virtual Machines
HotMIddlebox '16: Proceedings of the 2016 workshop on Hot topics in Middleboxes and Network Function VirtualizationPages 14–19https://doi.org/10.1145/2940147.2940153We wish to allocate outgoing bandwidth at a server among customer VMs. The allocation for each VM is proportional to the bandwidth purchased for that VM by the customer, while allowing idle bandwidth to redistributed. Classical fair queuing in routers ...
- research-articleAugust 2016
Robust bootstrapping memory analysis against anti-forensics
Digital Investigation: The International Journal of Digital Forensics & Incident Response (DIGITI), Volume 18, Issue SPages S23–S32https://doi.org/10.1016/j.diin.2016.04.009Memory analysis is increasingly used to collect digital evidence in incident response. With the fast growth in memory analysis, however, anti-forensic techniques appear to prevent it from performing the bootstrapping steps - operating system (OS) ...
- research-articleJuly 2015
Security Busters
Computers and Security (CSEC), Volume 52, Issue CPages 90–105https://doi.org/10.1016/j.cose.2015.04.009URL blacklists are used by the majority of modern web browsers as a means to protect users from rogue web sites, i.e. those serving malware and/or hosting phishing scams. There is a plethora of URL blacklists/reputation services, out of which Google's ...
- ArticleMay 2015
Obfuscating Windows DLLs
SPRO '15: Proceedings of the 2015 IEEE/ACM 1st International Workshop on Software ProtectionPages 24–30https://doi.org/10.1109/SPRO.2015.13We present two techniques to obfuscate the interfaces between application binaries and Windows system DLLs (dynamic-link libraries). The first technique obfuscates the related symbol information in the binary to prevent static analyses from identifying ...
- ArticleMay 2015
Platform Independent Malware Analysis Framework
IMF '15: Proceedings of the 2015 Ninth International Conference on IT Security Incident Management & IT Forensics (imf 2015)Pages 109–113https://doi.org/10.1109/IMF.2015.21Over the past years malicious software has evolved to a persistent threat on all major computer platforms. Due tothe high number of new threats which are released every day security researchers have developed automatic systems toanalyze and classify ...