This paper describes a model-based approach for designing distributed user interfaces (DUIs), i.e. graphical user interfaces that are distributed along one or many of the followin...
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
Increasing health care costs put a great strain on national economies. In recent years there have been several national and regional research and development projects in Finland a...