Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
Abstract. Incremental workflow mining is a technique for automatically deriving a process model from the on-going executions of a process. This way, the process model becomes more ...
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
This paper presents a fuzzy logic approach for switching multiple reference models, within the Model Reference Adaptive Control (MRAC) framework, in response to major changes in t...
Sukumar Kamalasadan, Adel A. Ghandakly, Khalid S. ...
—This paper presents a mathematical framework for resource reservation in TCP/IP networks by invoking a dynamic system viewpoint on the congestion monitoring processes occurring ...