Search Results for author: Serguei A. Mokhov

Found 8 papers, 2 papers with code

Application of Knowledge Graphs to Provide Side Information for Improved Recommendation Accuracy

1 code implementation7 Jan 2021 Yuhao Mao, Serguei A. Mokhov, Sudhir P. Mudur

Information about products and preferences of different users are primarily used to infer preferences for a specific user.

Clustering Collaborative Filtering +2

Toward Multimodal Interaction in Scalable Visual Digital Evidence Visualization Using Computer Vision Techniques and ISS

no code implementations1 Aug 2018 Serguei A. Mokhov, Miao Song, Jashanjot Singh, Joey Paquet, Mourad Debbabi, Sudhir Mudur

Visualization requirements in Forensic Lucid have to do with different levels of case knowledge abstraction, representation, aggregation, as well as the operational aspects as the final long-term goal of this proposal.

Management

Fast Context-Annotated Classification of Different Types of Web Service Descriptions

no code implementations31 May 2018 Serguei A. Mokhov, Joey Paquet, Arash Khodadadi

In the recent rapid growth of web services, IoT, and cloud computing, many web services and APIs appeared on the web.

Classification Cloud Computing +2

MARFCAT: Transitioning to Binary and Larger Data Sets of SATE IV

no code implementations16 Jul 2012 Serguei A. Mokhov, Joey Paquet, Mourad Debbabi, Yankui Sun

We present a second iteration of a machine learning approach to static code analysis and fingerprinting for weaknesses related to security, software engineering, and others using the open-source MARF framework and the MARFCAT application based on it for the NIST's SATE IV static analysis tool exposition workshop's data sets that include additional test cases, including new large synthetic cases.

BIG-bench Machine Learning

The use of machine learning with signal- and NLP processing of source code to fingerprint, detect, and classify vulnerabilities and weaknesses with MARFCAT

no code implementations12 Oct 2010 Serguei A. Mokhov

We present a machine learning approach to static code analysis and fingerprinting for weaknesses related to security, software engineering, and others using the open-source MARF framework and the MARFCAT application based on it for the NIST's SATE2010 static analysis tool exposition workshop found at http://samate. nist. gov/SATE2010Workshop. html

Cryptography and Security Programming Languages K.6.5; D.3

Complete Complementary Results Report of the MARF's NLP Approach to the DEFT 2010 Competition

no code implementations18 Jun 2010 Serguei A. Mokhov

This paper is aimed to present the complete result sets of all the conducted experiments and their settings in the resulting tables highlighting the approach and the best results, but also showing the worse and the worst and their subsequent analysis.

Service-Oriented Architectures and Web Services: Course Tutorial and Lab Notes

no code implementations17 Jul 2009 Serguei A. Mokhov, Shahriar Rostami, Hammad Ali, Min Chen, Yuhong Yan

This document presents a number of quick-step instructions to get started on writing mini-service-oriented web services-based applications using OpenESB 2. 31, Tomcat 6, GlassFish 2. x/3. 0. 1 with BPEL support, and Java 1. 6+ primarily in Scientific Linux 6. 6 with user quota restrictions.

Distributed, Parallel, and Cluster Computing Software Engineering 68N15, 68U35 H.3.5; C.2.4; D.1.3

Formally Specifying and Proving Operational Aspects of Forensic Lucid in Isabelle

1 code implementation24 Apr 2009 Serguei A. Mokhov, Joey Paquet

A Forensic Lucid intensional programming language has been proposed for intensional cyberforensic analysis.

Logic in Computer Science Cryptography and Security Programming Languages D.3.1; D.3.2; D.3.3; D.3.4

Cannot find the paper you are looking for? You can Submit a new open access paper.