Recognizing attack plans is one of the goals of security analysts. Attack plan recognition is critical for predicting future actions of attackers, generating possible actions (i.e...
Tatiana Kichkaylo, Tatyana Ryutov, Michael D. Oros...
As the global society becomes more interconnected and more privacy-conscious, communication protocols must balance access control with protecting participants’ privacy. A common ...
Emiliano De Cristofaro, Stanislaw Jarecki, Jihye K...
In this paper, we address the correct refinement of abstract architectural models into more platformspecific representations. We consider the challenging case of dynamic architect...
For software agents to become part of e-commerce they have to be flexible—to engage in negotiations of forms which are not known in advance, and mobile—to migrate to remote lo...
Costin Badica, Maria Ganzha, Marcin Paprzycki, Ama...
In this contribution we propose a generic service for realtime access to context-based music information such as lyrics or score data. In our web-based client-server scenario, a c...