Abstract: In benign programs, encryption is used to prevent sensitive data from being exposed. Malware, on the other hand, uses encryption to hide from analysis or perform malicious activities, e.g.
Robust M-Estimation Based Bayesian Cluster Enumeration for Real Elliptically Symmetric Distributions
Abstract: Robustly determining the optimal number of clusters in a data set is an essential factor in a wide range of applications. Cluster enumeration becomes challenging when the true underlying ...
The OWASP Benchmark Project is a Java test suite designed to verify the speed and accuracy of vulnerability detection tools. It is a fully runnable open source web application that can be analyzed by ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results