Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Abstract. Security breaches seldom occur because of faulty security mechanisms. Often times, security mechanisms are incorrectly incorporated in an application which allows them to...
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...
Quantitative data about security threats is a precondition for a precise assessment of security risks and consequently for an efficient management of information security. Curren...
—Due to modern pervasive wireless technologies and high-performance monitoring systems, spatio-temporal information plays an important role in areas such as intelligent transport...