Traditionally, machine learning algorithms have been evaluated in applications where assumptions can be reliably made about class priors and/or misclassification costs. In this pa...
Software Model-Checking and Testing are some of the most used techniques to analyze software systems and identify hidden faults. While software model-checking allows for an exhaust...
Antonio Bucchiarone, Henry Muccini, Patrizio Pelli...
This paper presents an approach to the architectural design and analysis of secure software systems based on the system requirements elicited in the form of use cases and misuse c...
Techniques are discussed for creating a rendered view into a 3D scene,interactively based on the locations and orientations of the observer's head and the display surface. St...
Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provid...