1 code implementation • 7 Jan 2021 • Yuhao Mao, Serguei A. Mokhov, Sudhir P. Mudur
Information about products and preferences of different users are primarily used to infer preferences for a specific user.
no code implementations • 1 Aug 2018 • Serguei A. Mokhov, Miao Song, Jashanjot Singh, Joey Paquet, Mourad Debbabi, Sudhir Mudur
Visualization requirements in Forensic Lucid have to do with different levels of case knowledge abstraction, representation, aggregation, as well as the operational aspects as the final long-term goal of this proposal.
no code implementations • 31 May 2018 • Serguei A. Mokhov, Joey Paquet, Arash Khodadadi
In the recent rapid growth of web services, IoT, and cloud computing, many web services and APIs appeared on the web.
no code implementations • 16 Jul 2012 • Serguei A. Mokhov, Joey Paquet, Mourad Debbabi, Yankui Sun
We present a second iteration of a machine learning approach to static code analysis and fingerprinting for weaknesses related to security, software engineering, and others using the open-source MARF framework and the MARFCAT application based on it for the NIST's SATE IV static analysis tool exposition workshop's data sets that include additional test cases, including new large synthetic cases.
no code implementations • 12 Oct 2010 • Serguei A. Mokhov
We present a machine learning approach to static code analysis and fingerprinting for weaknesses related to security, software engineering, and others using the open-source MARF framework and the MARFCAT application based on it for the NIST's SATE2010 static analysis tool exposition workshop found at http://samate. nist. gov/SATE2010Workshop. html
Cryptography and Security Programming Languages K.6.5; D.3
no code implementations • 18 Jun 2010 • Serguei A. Mokhov
This paper is aimed to present the complete result sets of all the conducted experiments and their settings in the resulting tables highlighting the approach and the best results, but also showing the worse and the worst and their subsequent analysis.
no code implementations • 17 Jul 2009 • Serguei A. Mokhov, Shahriar Rostami, Hammad Ali, Min Chen, Yuhong Yan
This document presents a number of quick-step instructions to get started on writing mini-service-oriented web services-based applications using OpenESB 2. 31, Tomcat 6, GlassFish 2. x/3. 0. 1 with BPEL support, and Java 1. 6+ primarily in Scientific Linux 6. 6 with user quota restrictions.
Distributed, Parallel, and Cluster Computing Software Engineering 68N15, 68U35 H.3.5; C.2.4; D.1.3
1 code implementation • 24 Apr 2009 • Serguei A. Mokhov, Joey Paquet
A Forensic Lucid intensional programming language has been proposed for intensional cyberforensic analysis.
Logic in Computer Science Cryptography and Security Programming Languages D.3.1; D.3.2; D.3.3; D.3.4