2024
GAN-based Seed Generation for Efficient Fuzzing.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Honeypot-Based Data Collection for Dark Web Investigations Using the Tor Network.
Proceedings of the Advances in Digital Forensics XX, 2024
2023
Adaptive distribution of control messages for improving bandwidth utilization in multiple NoC.
J. Supercomput., October, 2023
An improved reconfiguration algorithm for handling 1-point NoC failures.
Microprocess. Microsystems, 2023
Navigating the Concurrency Landscape: A Survey of Race Condition Vulnerability Detectors.
CoRR, 2023
A Survey of Side-Channel Attacks in Context of Cache - Taxonomies, Analysis and Mitigation.
CoRR, 2023
SAP: A Secure Low-Latency Protocol for Mitigating High Computation Overhead in WI-FI Networks.
IEEE Access, 2023
2022
Pre-Silicon NBTI Delay-Aware Modeling of Network-on-Chip Router Microarchitecture.
Microprocess. Microsystems, June, 2022
QoS-aware Mesh-based Multicast Routing Protocols in Edge Ad Hoc Networks: Concepts and Challenges.
ACM Trans. Internet Techn., 2022
Visibility enhancement and dehazing: Research contribution challenges and direction.
Comput. Sci. Rev., 2022
Dense spatially-weighted attentive residual-haze network for image dehazing.
Appl. Intell., 2022
2021
<i>Scaling & fuzzing: </i> Personal image privacy from automated attacks in mobile cloud computing.
J. Inf. Secur. Appl., 2021
Stand-alone PV water pumping system based on high-gain resonant inverter fed induction motor serving two-head for permanent water supply.
Int. J. Circuit Theory Appl., 2021
MapperDroid: Verifying app capabilities from description to permissions and API calls.
Comput. Secur., 2021
2020
TRACK: An algorithm for fault-tolerant, dynamic and scalable 2D mesh network-on-chip routing reconfiguration.
Integr., 2020
<i>SneakLeak+</i>: Large-scale klepto apps analysis.
Future Gener. Comput. Syst., 2020
<i>Vulvet</i>: Vetting of Vulnerabilities in Android Apps to Thwart Exploitation.
DTRAP, 2020
EspyDroid+: Precise reflection analysis of android apps.
Comput. Secur., 2020
SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage.
Comput. Commun., 2020
Secure Proof of Ownership Using Merkle Tree for Deduplicated Storage.
Autom. Control. Comput. Sci., 2020
Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements.
Adv. Comput., 2020
Multiple-NoC Exploration and Customization for Energy Efficient Traffic Distribution.
Proceedings of the 28th IFIP/IEEE International Conference on Very Large Scale Integration, 2020
2019
S2DIO: an extended scalable 2D mesh network-on-chip routing reconfiguration for efficient bypass of link failures.
J. Supercomput., 2019
You click, I steal: analyzing and detecting click hijacking attacks in web pages.
Int. J. Inf. Sec., 2019
ETGuard: Detecting D2D attacks using wireless Evil Twins.
Comput. Secur., 2019
UAVs Reliable Transmission for Multicast Protocols in FANETs.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019
Improving Static Power Efficiency via Placement of Network Demultiplexer over Control Plane of Router in Multi-NoCs.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
MAPPER: Mapping Application Description to Permissions.
Proceedings of the Risks and Security of Internet and Systems, 2019
2018
Enhancing QoE for video streaming in MANETs via multi-constraint routing.
Wirel. Networks, 2018
SWORD: Semantic aWare andrOid malwaRe Detector.
J. Inf. Secur. Appl., 2018
A Power Efficient Crossbar Arbitration in Multi-NoC for Multicast and Broadcast Traffic.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2018
Unsupervised Person Re-ID in Surveillance Feed Using Re-ranking.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018
APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018
DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018
Bloom Filter Based Privacy Preserving Deduplication System.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018
Privacy Preserving Data Offloading Based on Transformation.
Proceedings of the Risks and Security of Internet and Systems, 2018
2017
Moralism: mobility prediction with link stability based multicast routing protocol in MANETs.
Wirel. Networks, 2017
Balanced energy routing protocol for clustered wireless sensor network.
Int. J. Inf. Commun. Technol., 2017
Improved multicast routing in MANETs using link stability and route stability.
Int. J. Commun. Syst., 2017
QoS-aware Mesh based Multicast Routing Protocols in Ad-Hoc Networks: Concepts and Challenges.
CoRR, 2017
Android inter-app communication threats and detection techniques.
Comput. Secur., 2017
Multi-constraints link stable multicast routing protocol in MANETs.
Ad Hoc Networks, 2017
Performance-Enhanced d^2 -LBDR for 2D Mesh Network-on-Chip.
Proceedings of the VLSI Design and Test - 21st International Symposium, 2017
Improving Leakage Path Coverage in Android Apps.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
SniffDroid: Detection of Inter-App Privacy Leaks in Android.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
SneakLeak: Detecting Multipartite Leakage Paths in Android Apps.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Secure and efficient proof of ownership for deduplicated cloud storage.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
Flooding in secure wireless sensor networks: Student contribution.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
A Power, Thermal and Reliability-Aware Network-on-Chip.
Proceedings of the IEEE International Symposium on Nanoelectronic and Information Systems, 2017
Secure Random Encryption for Deduplicated Storage.
Proceedings of the Information Systems Security - 13th International Conference, 2017
Unraveling Reflection Induced Sensitive Leaks in Android Apps.
Proceedings of the Risks and Security of Internet and Systems, 2017
Detection of Information Leaks via Reflection in Android Apps.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Detecting Inter-App Information Leakage Paths.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
2016
DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis.
Proceedings of the Recent Advances in Computational Intelligence in Defense and Security, 2016
Resilient routing implementation in 2D mesh NoC.
Microelectron. Reliab., 2016
IET Comput. Digit. Tech., 2016
<i>σ</i> <sup> <i>n</i> </sup>LBDR: generic congestion handling routing implementation for two-dimensional mesh network-on-chip.
IET Comput. Digit. Tech., 2016
Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions.
CoRR, 2016
Android App Collusion Threat and Mitigation Techniques.
CoRR, 2016
Colluding browser extension attack on user privacy and its implication for web browsers.
Comput. Secur., 2016
MCLSPM: Multi-constraints link stable multicast routing protocol in adhoc networks.
Proceedings of the 2016 Wireless Days, 2016
A Power Efficient Dual Link Mesh NoC Architecture to Support Nonuniform Traffic Arbitration at Routing Logic.
Proceedings of the 29th International Conference on VLSI Design and 15th International Conference on Embedded Systems, 2016
Reducing FIFO buffer power using architectural alternatives at RTL.
Proceedings of the 20th International Symposium on VLSI Design and Test, 2016
Android component vulnerabities: Proof of concepts and mitigation.
Proceedings of the 2016 International Conference on Information Networking, 2016
Detection of SQLite Database Vulnerabilities in Android Apps.
Proceedings of the Information Systems Security - 12th International Conference, 2016
ELBA: Efficient Layer Based Routing Algorithm in SDN.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016
FlowMine: Android app analysis via data flow.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016
Intersection Automata Based Model for Android Application Collusion.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
2015
Bandwidth-aware routing and admission control for efficient video streaming over MANETs.
Wirel. Networks, 2015
Employing Program Semantics for Malware Detection.
IEEE Trans. Inf. Forensics Secur., 2015
A Brief Comment on "A Complete Self-Testing and Self-Configuring NoC Infrastructure for Cost-Effective MPSoCs" [ACM Transactions on Embedded Computing Systems 12 (2013) Article 106].
ACM Trans. Embed. Comput. Syst., 2015
JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET.
J. Inf. Secur. Appl., 2015
AndroSimilar: Robust signature for detecting variants of Android malware.
J. Inf. Secur. Appl., 2015
Android Security: A Survey of Issues, Malware Penetration, and Defenses.
IEEE Commun. Surv. Tutorials, 2015
Multivariate verification for sybil attack detection in VANET.
Open Comput. Sci., 2015
CERI: Cost-Effective Routing Implementation Technique for Network-on-Chip.
Proceedings of the 28th International Conference on VLSI Design, 2015
C<sup>2</sup>-DLM: Cache coherence aware dual link mesh for on-chip interconnect.
Proceedings of the 19th International Symposium on VLSI Design and Test, 2015
A framework for thermal aware reliability estimation in 2D NoC.
Proceedings of the 19th International Symposium on VLSI Design and Test, 2015
σLBDR: Congestion-aware logic based distributed routing for 2D NoC.
Proceedings of the 19th International Symposium on VLSI Design and Test, 2015
Network-on-chip: Current issues and challenges.
Proceedings of the 19th International Symposium on VLSI Design and Test, 2015
sandFOX: secure sandboxed and isolated environment for firefox browser.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
A robust dynamic analysis system preventing SandBox detection by Android malware.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
DynaDroid: dynamic binary instrumentation based app behavior monitoring framework.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
DRACO: DRoid analyst combo an android malware analysis framework.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
d<sup>2</sup>-LBDR: distance-driven routing to handle permanent failures in 2D mesh NOCs.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015
2014
Exploiting convergence characteristics to tackle collusion attacks in OLSR for <i>Security and Communication Networks</i>.
Secur. Commun. Networks, 2014
Sybil attack detection in VANET using neighbouring vehicles.
Int. J. Secur. Networks, 2014
Detecting malicious files using non-signature-based methods.
Int. J. Inf. Comput. Secur., 2014
CARM: Congestion Adaptive Routing Method for On Chip Networks.
Proceedings of the 2014 27th International Conference on VLSI Design, 2014
A novel non-minimal turn model for highly adaptive routing in 2D NoCs.
Proceedings of the 22nd International Conference on Very Large Scale Integration, 2014
Distributed adaptive routing for spidergon NoC.
Proceedings of the 18th International Symposium on VLSI Design and Test, 2014
Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation.
Proceedings of the 13th IEEE International Conference on Trust, 2014
Exploring Worm Behaviors using DTW.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Analysis of Identity Forging Attack in MANETs.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Platform Neutral Sandbox for Analyzing Malware and Resource Hogger Apps.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
P-SPADE: GPU accelerated malware packer detection.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Fault tolerant routing implementation mechanism for irregular 2D mesh NoCs.
Proceedings of the 2014 NORCHIP, Tampere, Finland, October 27-28, 2014, 2014
A novel non-minimal/minimal turn model for highly adaptive routing in 2D NoCs.
Proceedings of the Eighth IEEE/ACM International Symposium on Networks-on-Chip, 2014
Improved Route Selection Approaches using Q-learning framework for 2D NoCs.
Proceedings of the 3rd International Workshop on Many-core Embedded Systems (MES'2015) held on June 13, 2014
Privacy Leakage Attacks in Browsers by Colluding Extensions.
Proceedings of the Information Systems Security - 10th International Conference, 2014
LSMRP: Link stability based multicast routing protocol in MANETs.
Proceedings of the Seventh International Conference on Contemporary Computing, 2014
Highly adaptive and congestion-aware routing for 3D NoCs.
Proceedings of the Great Lakes Symposium on VLSI 2014, GLSVLSI '14, Houston, TX, USA - May 21, 2014
Environment-Reactive Malware Behavior: Detection and Categorization.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
Fault tolerant and highly adaptive routing for 2D NoCs.
Proceedings of the 2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2014
Dynamic fault injection model for on-chip 2D mesh network.
Proceedings of the 7th ACM India Computing Conference, 2014
2013
Near-Optimal Geometric Feature Selection for Visual speech Recognition.
Int. J. Pattern Recognit. Artif. Intell., 2013
Fault Aware Dynamic Adaptive Routing Using LBDR.
Proceedings of the VLSI Design and Test, 17th International Symposium, 2013
The darker side of Firefox extension.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
AndroSimilar: robust statistical feature signature for Android malware detection.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Energy Efficient Clustered Routing for Wireless Sensor Network.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013
Energy Scavenging Based HybridGSM Model for Mobile Towers.
Proceedings of the Recent Advances in Intelligent Informatics, 2013
Ns-3 emulation on ORBIT testbed.
Proceedings of the International Conference on Advances in Computing, 2013
An adaptive cross-layer routing protocol for delay-sensitive applications over MANETs.
Proceedings of the International Conference on Advances in Computing, 2013
Reconfigurable distributed fault tolerant routing algorithm for on-chip networks.
Proceedings of the 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2013
Video streaming over MANETs: Testing and analysis using real-time emulation.
Proceedings of the 19th Asia-Pacific Conference on Communications, 2013
QoS-aware routing for transmission of H.264/SVC encoded video traffic over MANETs.
Proceedings of the 19th Asia-Pacific Conference on Communications, 2013
Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN.
Proceedings of the 4th International Conference on Ambient Systems, 2013
MCF: MultiComponent Features for Malware Analysis.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
DroidOLytics: Robust Feature Signature for Repackaged Android Apps on Official and Third Party Android Markets.
Proceedings of the 2013 2nd International Conference on Advanced Computing, 2013
Trust Establishment Techniques in VANET.
Proceedings of the Wireless Networks and Security, Issues, Challenges and Research Trends., 2013
2012
Lip peripheral motion for visual surveillance.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
ESCAPE: entropy score analysis of packed executable.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Detection attack analysis using partial watermark in DCT domain.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Detection of incorrect position information using speed and time span verification in VANET.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Mining control flow graph as <i>API call-grams</i> to detect portable executable malware.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
SPADE: Signature based PAcker DEtection.
Proceedings of the First International Conference on Security of Internet of Things, 2012
Behavioural detection with <i>API call-grams</i> to identify malicious PE files.
Proceedings of the First International Conference on Security of Internet of Things, 2012
Speaker identification using optimal lip biometrics.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012
n-Gram modeling of relevant features for lip-reading.
Proceedings of the 2012 International Conference on Advances in Computing, 2012
A rate adaptive and multipath routing protocol to support video streaming in MANETs.
Proceedings of the 2012 International Conference on Advances in Computing, 2012
REFORM: Relevant Features for Malware Analysis.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
A Node-Disjoint Multipath Routing Method Based on AODV Protocol for MANETs.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012
2011
C-Routing: An adaptive hierarchical NoC routing methodology.
Proceedings of the IEEE/IFIP 19th International Conference on VLSI and System-on-Chip, 2011
A sybil attack detection approach using neighboring vehicles in VANET.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
Acceleration of packet filtering using gpgpu.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
A Novel Attack Model Simulation in DSDV Routing.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011
Position forging attacks in Vehicular Ad Hoc Networks: Implementation, impact and detection.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Detection of Broken Link Fraud in DSDV Routing.
Proceedings of the Computer and Information Sciences II, 2011
Boundary Descriptors for Visual Speech Recognition.
Proceedings of the Computer and Information Sciences II, 2011
Parallelizing TUNAMI-N1 Using GPGPU.
Proceedings of the 13th IEEE International Conference on High Performance Computing & Communication, 2011
Acceleration of Functional Validation Using GPGPU.
Proceedings of the Sixth IEEE International Symposium on Electronic Design, 2011
A Traffic Model for Concurrent Core Tasks in Networks-on-Chip.
Proceedings of the Sixth IEEE International Symposium on Electronic Design, 2011
GA Based Congestion Aware Topology Generation for Application Specific NoC.
Proceedings of the Sixth IEEE International Symposium on Electronic Design, 2011
PEAL - Packed Executable AnaLysis.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011
Misbehavior Detection Based on Ensemble Learning in VANET.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011
A Rate Adaptation Scheme to Support QoS for H.264/SVC Encoded Video Streams over MANETs.
Proceedings of the Advanced Communication and Networking, 2011
Scattered Feature Space for Malware Analysis.
Proceedings of the Advances in Computing and Communications, 2011
Contribution of Oral Periphery on Visual Speech Intelligibility.
Proceedings of the Advances in Computing and Communications, 2011
Broken Link Fraud in DSDV Routing - Detection and Countermeasure.
Proceedings of the Advances in Computing and Communications, 2011
Analysis of a Traffic Classification Scheme for QoS Provisioning over MANETs.
Proceedings of the Advances in Computing and Communications, 2011
A Novel Attack Model Simulation in OLSR.
Proceedings of the Advances in Computing and Communications, 2011
Robust Watermarking through Spatially Disjoint Transformations.
Proceedings of the Advances in Computing and Communications, 2011
Machine Learning Approach for Multiple Misbehavior Detection in VANET.
Proceedings of the Advances in Computing and Communications, 2011
Metamorphic Malware Analysis and Detection Methods.
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011
DoS Attacks in MANETs: Detection and Countermeasures.
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011
2010
Collusion attack resistance through forced MPR switching in OLSR.
Proceedings of the 3rd IFIP Wireless Days Conference 2010, 2010
A collusion attack detection method for OLSR-based MANETS employing scruple packets.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010
MEDUSA: MEtamorphic malware dynamic analysis usingsignature from API.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010
A novel defense mechanism against sybil attacks in VANET.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010
ERA: An Efficient Routing Algorithm for Power, Throughput and Latency in Network-on-Chips.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010
Genetic algorithm based topology generation for application specific Network-on-Chip.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010
Minimal Path, Fault Tolerant, QoS Aware Routing with Node and Link Failure in 2-D Mesh NoC.
Proceedings of the 25th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, 2010
Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks.
Proceedings of the Recent Trends in Network Security and Applications, 2010
Lipreading Using <i>n</i>-Gram Feature Vector.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010
Permuted Image DCT Watermarking.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010
2009
Static CFG analyzer for metamorphic Malware code.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
Buyer seller watermarking protocol for digital rights management.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
Implementation of QoS Aware Q-Routing Algorithm for Network-on-Chip.
Proceedings of the Contemporary Computing - Second International Conference, 2009
2008
Fast Feature Point Detector.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008
Structural Fault Modelling in Nano Devices.
Proceedings of the Nano-Net - Third International ICST Conference, 2008
Feature Point Detection for Real Time Applications.
Proceedings of the 2008 International Conference on Image Processing, 2008
Corner Detection on Curves.
Proceedings of the GRAPP 2008, 2008
2007
Corner Detection Using Difference Chain Code as Curvature.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Optimizing Task Distribution for Heterogeneous Desktop Clusters.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2007
Transformation Invariant Robust Shape Analysis.
Proceedings of the 2007 International Conference on Image Processing, 2007
2006
Human and machine perception of biological motion.
Cogn. Syst. Res., 2006
Morphological Edge Detection and Corner Detection Algorithm Using Chain Encoding.
Proceedings of the 2006 International Conference on Image Processing, 2006
2003
Biologically-inspired motion detection and classification : human and machine perception.
PhD thesis, 2003
2002
Biologically-inspired human motion detection.
Proceedings of the 10th Eurorean Symposium on Artificial Neural Networks, 2002