Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
Advances in telecommunications and GPS sensors technology have made possible the collection of data like time series of locations, related to the movement of individuals. The anal...
Abstract. We present a framework for modeling adversaries in security protocol analysis, ranging from a Dolev-Yao style adversary to more powerful adversaries who can reveal differ...
In healthcare domain, there is a gap between healthcare systems and government regulations such as the Health Insurance Portability and Accountability Act (HIPAA). The violations ...
Security, privacy and governance are increasingly the focus of government regulations in the U.S., Europe and elsewhere. This trend has created a “regulation compliance” probl...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...