Resolving Vulnerability Identification Errors using Security Requirements on Business Process Models
Resolving Vulnerability Identification Errors using Security Requirements on Business Process Models
A Resource Flow Approach to Modelling Care Pathways
Risk Management of Medical IT Networks: An ISO/IEC 15504 Compliant Approach to Assessment against IEC 80001-1
Road-Casting: A New Distributed Dissemination Protocol for Safety Messages in Urban Areas.
A Process Assessment Model for Security Assurance of Networked Medical Devices
Profile-based, load-independent anomaly detection and analysis in performance regression testing of software systems
Protecting Organizational Data Confidentiality in the Cloud using a High-Performance Anonymization Engine
QoE-driven User-centric VoD Services in Urban Multi-homed P2P-based Vehicular Networks
Quantification of information systems security with stochastic calculus
Reasoning with Contextual Requirements: Detecting Inconsistency and Conflicts