Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Trojan messages are messages that seem correct to the receiver but cannot be generated by any correct sender. Such messages constitute major vulnerability points of a distributed system---they constitute ideal targets for a malicious actor and facilitate f ...
Networked computing environments are subject to configuration errors, unauthorized users, undesired activities and attacks by malicious software. These can be detected by monitoring network traffic, but network administrators are overwhelmed by the amount ...
A well-known approach for collaborative spam filtering is to determine which emails belong to the same bulk, e.g. by exploiting their content similarity. This allows, after observing an initial portion of a bulk, for the bulkiness scores to be assigned to ...
How can we protect the network infrastructure from malicious traffic, such as scanning, malicious code propagation, and distributed denial-of-service (DDoS) attacks? One mechanism for blocking malicious traffic is filtering: access control lists (ACLs) can ...
The golden age of antimicrobial drug development is a distant memory, and the likelihood of there being another seems slim. In part, this is because the pharmaceutical industry, which has now adopted an unsustainable business model, abandoned the anti-infe ...
Cavitation erosion prediction and characterization of cavitation field strength are of interest to industries suffering from cavitation erosion detrimental effects. One means to evaluate cavitation fields and materials is to examine pitting rates during th ...
Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checking based approach to malware detection can capture the semantics of security exploits ...
Type-and-effect systems are a well-studied approach for reasoning about the computational behavior of programs. Nevertheless, there is only one example of an effect system that has been adopted in a wide-spread industrial language: Java’s checked exception ...
Effective analyte delivery is essential to achieve rapid and sensitive biodetection systems. In this article, we present an actively controlled fluidic system integrated with a suspended plasmonic nanohole sensor to achieve superior analyte delivery effici ...
Fast and sensitive virus detection techniques which can be rapidly deployed at multiple sites are essential to prevent and control future epidemics and bioterrorism threats In this Letter we demonstrate a label free optofluidic nanoplasmonic sensor that ca ...