—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
Recent trends in automotive manufacturing have increased the focus on the Just-In-Time (JIT) delivery of automotive components. By requiring smaller batches of parts delivered mor...
Researchers are using emerging technologies to develop novel play environments, while established computer and console game markets continue to grow rapidly. Even so, evaluating t...
Regan L. Mandryk, M. Stella Atkins, Kori M. Inkpen
Abstract. In this paper we identify the common techniques and technologies that are enabling location identification in a ubiquitous computing environment. We also address the imp...
Kavitha Muthukrishnan, Maria Eva Lijding, Paul J. ...
Abstract--Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take ...