Zobrazeno 1 - 10
of 88
pro vyhledávání: '"Paolo Falcarin"'
Publikováno v:
Ingeniería e Investigación, Vol 34, Iss 1, Pp 66-71 (2014)
This paper presents HAUTO, a framework able to compose convergent services automatically. HAUTO is based in HTN (hierarchical task networks) Automated Planning and is composed of three modules: a request processing module that transforms natural lang
Externí odkaz:
https://doaj.org/article/4c7ac0115bd944419ca32556c4ec91c8
Autor:
Bjorn De Sutter, Alessandro Cabutto, Bert Abrath, Brecht Wyseur, Paolo Falcarin, Bart Coppens, Jens Van den Broeck
Publikováno v:
ACM Transactions on Privacy and Security. 23:1-31
Software protection aims at safeguarding assets embedded in software by preventing and delaying reverse engineering and tampering attacks. This paper presents an architecture and supporting tool flow to renew parts of native applications dynamically.
Publikováno v:
Communications in Computer and Information Science ISBN: 9783030972547
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::efbfc3c79853a0a4a24633de0018bf79
https://doi.org/10.1007/978-3-030-97255-4_5
https://doi.org/10.1007/978-3-030-97255-4_5
Autor:
Andres Baravalle, Allan J. Brimicombe, Mihaela Anca Ciupala, Paolo Falcarin, Ahmed Abdulhasan Alwan, Seyed Ali Ghorashi
Publikováno v:
Information Systems. 105:101951
Cyber-physical systems (CPSs) are integrated systems engineered to combine computational control algorithms and physical components such as sensors and actuators, effectively using an embedded communication core. Smart cities can be viewed as large-s
Publikováno v:
FMEC
Smart cities rely on large-scale heterogeneous distributed systems known as Cyber-Physical Systems (CPS). Information systems based on CPS typically analyse a massive amount of data collected from various data sources that operate under noisy and dyn
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2688a945fe3da9390a50bb2b4c60bc5a
http://hdl.handle.net/10278/3743232
http://hdl.handle.net/10278/3743232
Publikováno v:
Periodicals of Engineering and Natural Sciences (PEN). 9:579
The random forest algorithm is one of important supervised machine learning (ML) algorithms. In the present paper, the accuracy of the results of the random forest (RF) algorithm has been improved by the use of the One Hot Encoding method. The Intrus
Autor:
Paolo Falcarin, Michael Zunke
Publikováno v:
CCS
Software Protection techniques aim to defend the confidentiality and integrity of software applications that are exposed to an adversary that shares the execution host and access privileges of the application. This scenario is often denoted as protec
Publikováno v:
JOURNAL OF SYSTEMS AND SOFTWARE
Software protection techniques are used to protect valuable software assets against man-at-the-end attacks. Those attacks include reverse engineering to steal confidential assets, and tampering to break the software’s integrity in unauthorized ways
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d14e03d8705913868f18e1726d737fd5
http://hdl.handle.net/10278/3743231
http://hdl.handle.net/10278/3743231
Autor:
Cataldo Basile, Marco Torchiano, Bjorn De Sutter, Paolo Tonella, Paolo Falcarin, Bart Coppens, Mariano Ceccato
Publikováno v:
EMPIRICAL SOFTWARE ENGINEERING
When critical assets or functionalities are included in a piece of software accessible to the end users, code protections are used to hinder or delay the extraction or manipulation of such critical assets. The process and strategy followed by hackers
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e0d364310b5a3337c85f94ec00942bc2
http://hdl.handle.net/10278/3743230
http://hdl.handle.net/10278/3743230