|
|
|
Håkon Harnes and Donn Morrison
WebAssembly is a low-level bytecode language that enables high-level languages like C, C++, and Rust to be executed in the browser at near-native performance. In recent years, WebAssembly has gained widespread adoption and is now natively supported by al...
ver más
|
|
|
|
|
|
|
Alejandro Valencia-Arias, Juan David González-Ruiz, Lilian Verde Flores, Luis Vega-Mori, Paula Rodríguez-Correa and Gustavo Sánchez Santos
Machine learning and blockchain technology are fast-developing fields with implications for multiple sectors. Both have attracted a lot of interest and show promise in security, IoT, 5G/6G networks, artificial intelligence, and more. However, challenges ...
ver más
|
|
|
|
|
|
|
Sibel Kapan and Efnan Sora Gunal
In phishing attack detection, machine learning-based approaches are more effective than simple blacklisting strategies, as they can adapt to new types of attacks and do not require manual updates. However, for these approaches, the choice of features and...
ver más
|
|
|
|
|
|
|
Fahad M. Alotaibi and Vassilios G. Vassilakis
Web attacks pose a significant threat to enterprises, as attackers often target web applications first. Various solutions have been proposed to mitigate and reduce the severity of these threats, such as web application firewalls (WAFs). On the other hand...
ver más
|
|
|
|
|
|
|
Zoltán Szabó and Vilmos Bilicki
Due to the proliferation of large language models (LLMs) and their widespread use in applications such as ChatGPT, there has been a significant increase in interest in AI over the past year. Multiple researchers have raised the question: how will AI be a...
ver más
|
|
|
|
|
|
|
Harshvardhan J. Pandit
Solid is a new radical paradigm based on decentralising control of data from central organisations to individuals that seeks to empower individuals to have active control of who and how their data is being used. In order to realise this vision, the use-c...
ver más
|
|
|
|
|
|
|
Antonio Maci, Alessandro Santorsola, Antonio Coscia and Andrea Iannacone
Web phishing is a form of cybercrime aimed at tricking people into visiting malicious URLs to exfiltrate sensitive data. Since the structure of a malicious URL evolves over time, phishing detection mechanisms that can adapt to such variations are paramou...
ver más
|
|
|
|
|
|
|
Konstantinos Demertzis, Konstantinos Rantos, Lykourgos Magafas, Charalabos Skianis and Lazaros Iliadis
Pursuing ?intelligent justice? necessitates an impartial, productive, and technologically driven methodology for judicial determinations. This scholarly composition proposes a framework that harnesses Artificial Intelligence (AI) innovations such as Natu...
ver más
|
|
|
|
|
|
|
Franco Frattolillo
Watermarking protocols, in conjunction with digital watermarking technologies, make it possible to trace back digital copyright infringers by identifying who has legitimately purchased digital content and then illegally shared it on the Internet. Althoug...
ver más
|
|
|
|
|
|
|
Dan Liu, Zhongkai Yao, Xiaoxia Yang, Chunmei Xiong and Qingyu Nie
The agricultural non-point source (NPS) pollution caused by non-irrigated farming, such as heavy metals, nitrogen and phosphorus, has posed an extreme threat to the security of agricultural product quality and watershed ecology. Thus, it is urgent to sor...
ver más
|
|
|
|