Filtering is a very important issue in next generation networks. These networks consist of a relatively high number of resource constrained devices with very special features, suc...
Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Ga...
— Epidemiology, the science that studies the cause and propagation of diseases, provides us with the concepts and methods to analyze the potential risk factors to which ADSL cust...
Trust network analysis with subjective logic (TNA-SL) simplifies complex trust graphs into series-parallel graphs by removing the most uncertain paths to obtain a canonical graph...
A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field of information security, is described. Based on this paradigm a novel approac...
Abstract. This paper presents our pattern-based approach to run-time requirements monitoring and threat detection being developed as part of an approach to build frameworks support...
Hierarchically structured data collections often need to be visualized for the purposes of digital information management and presentation. File browsing, in particular, has an in...
Maria Golemati, Akrivi Katifori, Eugenia G. Gianno...
—The proliferation of exploit codes greatly expedites attacks in cyber world. This research compiles important dates on vulnerability from various sources into five patterns of l...
: Companies attempt to companies are attempting to find ways to improve their flexibility and responsiveness and in turn competitiveness by changing their operations strategy, meth...
Mobile supply chain management is increasingly recognized as an area offering significant potential for generating improvements and creating competitive advantage to corporations....
Given that resource providers and consumers may have different requirements and performance goals, concurrent negotiation is considered in this work to successfully obtain commitm...