Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
How can we protect the network infrastructure from malicious traffic, such as scanning, malicious code propagation, and distributed denial-of-service (DDoS) attacks? One mechanism for blocking malicious traffic is filtering: access control lists (ACLs) can ...
The golden age of antimicrobial drug development is a distant memory, and the likelihood of there being another seems slim. In part, this is because the pharmaceutical industry, which has now adopted an unsustainable business model, abandoned the anti-infe ...
Cavitation erosion prediction and characterization of cavitation field strength are of interest to industries suffering from cavitation erosion detrimental effects. One means to evaluate cavitation fields and materials is to examine pitting rates during th ...
Effective analyte delivery is essential to achieve rapid and sensitive biodetection systems. In this article, we present an actively controlled fluidic system integrated with a suspended plasmonic nanohole sensor to achieve superior analyte delivery effici ...
Networked computing environments are subject to configuration errors, unauthorized users, undesired activities and attacks by malicious software. These can be detected by monitoring network traffic, but network administrators are overwhelmed by the amount ...
Fast and sensitive virus detection techniques which can be rapidly deployed at multiple sites are essential to prevent and control future epidemics and bioterrorism threats In this Letter we demonstrate a label free optofluidic nanoplasmonic sensor that ca ...
A well-known approach for collaborative spam filtering is to determine which emails belong to the same bulk, e.g. by exploiting their content similarity. This allows, after observing an initial portion of a bulk, for the bulkiness scores to be assigned to ...
Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checking based approach to malware detection can capture the semantics of security exploits ...
Trojan messages are messages that seem correct to the receiver but cannot be generated by any correct sender. Such messages constitute major vulnerability points of a distributed system---they constitute ideal targets for a malicious actor and facilitate f ...
Type-and-effect systems are a well-studied approach for reasoning about the computational behavior of programs. Nevertheless, there is only one example of an effect system that has been adopted in a wide-spread industrial language: Java’s checked exception ...