Learn More
Monitoring the behavior of program execution at run-time is widely used to differentiate benign and malicious processes executing in the host computer. Most of the existing run-time malware detection methods use the information available in Windows Application Programming Interface (API) calls. The proposed malware detection system uses the Windows API call(More)
<i>The American Voter</i> - a seminal work in political science - uncovered the multifaceted nature of voting behavior which has been corroborated in electoral research for decades since. In this paper, we leverage <i>The American Voter</i> as an analysis framework in the realm of computational political science, employing the factors of <i>party,(More)
Facial Expression Recognition has increasing importance in assisting human-computer interaction issues. This paper "Emotion Recognition Using Fuzzy Rule-Based System" proposes a fuzzy method for the facial emotions recognition on still images of the face. The technique involves extracting mathematical data from some special regions of the face. The(More)
Among various range finding methods stereo vision is worthy of notice since it needs no active media. However because of correspondence problem, the stereo vision has not been fully established as a computer vision system. In this paper we used fuzzy logic to bypass the correspondence problem in stereo vision for calculating the distances of objects.
Cascades represent an important phenomenon across various disciplines such as sociology, economy, psychology, political science, marketing, and epidemiology. The goal of this paper is to develop a model for cascade size prediction in online social networks. Specifically, given the first τ1 edges in a cascade, we want to predict whether the cascade will have(More)
Industrial Control Systems (ICS) are widely deployed in mission critical infrastructures such as manufacturing, energy, and transportation. The mission critical nature of ICS devices poses important security challenges for ICS vendors and asset owners. In particular, the patching of ICS devices is usually deferred to scheduled production outages so as to(More)