This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
The high speed at which new businesses are developed can to a large extent be attributed to their ability to flexibly combine existing services into an integrated business platfor...
— Our work focuses on the use of formal techniques in order to increase the quality of HCI software and of all the processes resulting from the development, verification, design...
A number of papers have investigated the relationships between design metrics and the detection of faults in object-oriented software. Several of these studies have shown that suc...
When the Asynchronous Method Invocation (AMI) model was introduced into the CORBA specification, client applications benefited from the ability to invoke nonblocking two-way reque...
Darrell Brunsch, Carlos O'Ryan, Douglas C. Schmidt