This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Traditional design representations are inadequate for generalized reasoning about modularity in design and its technical and economic implications. We have developed an architectu...
There is a general agreement among software engineering practitioners that software inspections are an important technique to achieve high software quality at a reasonable cost. H...
Lionel C. Briand, Bernd G. Freimut, Ferdinand Voll...
Creation of an Outpatient Procedure Center (OPC) is a complicated endeavor, requiring a detailed understanding of the resources available and the procedures to be performed. Misca...
Todd R. Huschka, Brian T. Denton, Bradly J. Narr, ...
This paper discusses the security of a leakage-resilient stream cipher presented at FOCS 2008, instantiated in a practical setting. Based on a case study, we put forward implementa...