Results 41 to 50 of about 3,148 (188)
Randomized Instruction Sets and Runtime Environments: Past Research and Future Directions [PDF]
Instruction set randomization offers a way to combat code-injection attacks by separating code from data (specifically, by randomizing legitimate code's execution environment).
Keromytis, Angelos D.
core +2 more sources
Abstract This study examined second language vocabulary processing and learning in reading only (RO) versus reading while listening (RWL). 119 English learners read or read‐while‐listening to a story embedded with 25 pseudowords, 10 times each, and had their eye movements tracked.
Jonathan Malone +3 more
wiley +1 more source
Combining Relational Algebra, SQL, Constraint Modelling, and Local Search
The goal of this paper is to provide a strong integration between constraint modelling and relational DBMSs. To this end we propose extensions of standard query languages such as relational algebra and SQL, by adding constraint modelling capabilities to ...
Aarts +8 more
core +2 more sources
On The General Applicability of Instruction-Set Randomization [PDF]
We describe Instruction-Set Randomization (ISR), a general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoffs' principle to create OS process-specific randomized instruction sets (e.g., machine instructions ...
Boyd, Stephen W. +4 more
core +4 more sources
ABSTRACT Child sexual abuse (CSA) cases can involve multiple similar incidents over a long duration. Complainants can either report the offence shortly after it occurs, leading to a brief delay between the end of the abuse and court hearing (timely delay; CSA) or the court hearing takes place 2 or more years after its occurrence (delayed; historical ...
Fiza Hasan +2 more
wiley +1 more source
With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to achieve the above goal.
Liang Yan +5 more
doaj +1 more source
Certificateless Searchable Encryption Scheme in Multi-User Environment
Searchable encryption technology enables users to access data that has been made publicly encrypted without divulging the original content. The majority of the currently available multi-user certificateless searchable encryption technologies are based on
Tao Feng, Jiewen Si
doaj +1 more source
Privacy-Preserving Genetic Relatedness Test [PDF]
An increasing number of individuals are turning to Direct-To-Consumer (DTC) genetic testing to learn about their predisposition to diseases, traits, and/or ancestry. DTC companies like 23andme and Ancestry.com have started to offer popular and affordable
De Cristofaro, Emiliano +2 more
core +1 more source
Social media algorithms drive a hidden risk chain: over‐disclosure → behavioral fusion → targeted attacks. We propose a 128‐dim, law‐aware risk scoring model with Drools‐based dynamic alerts for universities. ABSTRACT As universities undergo accelerated digital transformation, social media algorithms—while streamlining campus services—have emerged as a
Weishu Ye, Zhi Li
wiley +1 more source
APRT – Another Pattern Recognition Tool [PDF]
Understanding and using Design Patterns improves software quality through better comprehension of programs for both experienced developers and relative novices.
Bates, Christopher, Robinson, Ashley
core +2 more sources

