This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Within the field of software security we have yet to find efficient ways on how to learn from past mistakes and integrate security as a natural part of software development. Th...
The peer-to-peer (P2P) model generally requires that bidirectional and direct communications for contentdelivery be set up between user peers after discovery of the desired conten...
Tetsuya Oh-ishi, Koji Sakai, Tetsuya Iwata, Akira ...
Objects in the world can be arranged into a hierarchy based on their semantic meaning (e.g. organism ? animal ? feline ? cat). What about defining a hierarchy based on the visual ...
Josef Sivic, Bryan C. Russell, Andrew Zisserman, W...
This paper continues the movement from technology centered to human centered approaches in the study of tasks that involve finding, understanding, and using information, and tools...