|
|
|
|
|
|
Date Reviewed |
|
|
1 - 5 of 5
reviews
|
|
|
|
|
|
|
|
Rethinking regex engines to address ReDoS Davis J. ESEC/FSE 2019 (Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Tallinn, Estonia, Aug 26-30, 2019) 1256-1258, 2019. Type: Proceedings
Regular expressions (regexes) are widely used across computer science applications and software components. However, not all programming languages are immune to regular expression denial-of-service (ReDoS) attacks. These algorithmic co...
|
Dec 31 2020 |
|
|
|
|
|
|
Adaptive network tools and services network topology mapper Monserate G., Mendez J. ICIT 2018 (Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, Hong Kong, Dec 29-31, 2018) 115-119, 2018. Type: Proceedings
Modern educational institutions provide Internet access in order to empower students with web-based resources. These institutions typically use network tools for terminal monitoring, power management, and access control....
|
Jul 30 2019 |
|
|
|
|
|
|
Scalable and efficient data analytics and mining with Lemonade dos Santos W., Avelar G., Ribeiro M., Guedes D., Meira Jr. W. Proceedings of the VLDB Endowment 11(12): 2070-2073, 2018. Type: Article
It is unreasonable to assume that data analysis experts are adept at computer programming. However, many tools that a data analyst may want to use require significant programming skills. Moreover, with the amount of information availab...
|
May 21 2019 |
|
|
|
|
|
|
A novel multilayer AAA model for integrated applications Rezakhani A., Shirazi H., Modiri N. Neural Computing and Applications 29(10): 887-901, 2018. Type: Article
Unidimensional static security policies cannot cater to the needs of a growing enterprise anymore. Local regulations, business processes, operational levels, and threat modeling are the key anchors around which successful organizations...
|
Mar 22 2019 |
|
|
|
|
|
|
A long way to the top: significance, structure, and stability of Internet top lists Scheitle Q., Hohlfeld O., Gamba J., Jelten J., Zimmermann T., Strowes S., Vallina-Rodriguez N. IMC 2018 (Proceedings of the 2018 Internet Measurement Conference, Boston, MA, Oct 31-Nov 2, 2018) 478-493, 2018. Type: Proceedings
Research communities that analyze parameters like Internet measurement, privacy, and network security typically use Internet top lists. As the selected Internet top list affects the research, it is very important to know how these list...
|
Feb 5 2019 |
|
|
|
|
|
|
|
|
|
|
|