Against the background of the current financial crisis and an aftermath of increasing regulation, companies enhance and integrate information systems in the areas of risk manageme...
Anke Gericke, Hans-Georg Fill, Dimitris Karagianni...
Policy override is gaining traction in the research community to improve the efficiency and usability of authorization mechanisms. These mechanisms turn the conventional privilege...
Telephony over IP is exposed to multiple security threats. Conventional protection mechanisms do not fit into the highly dynamic, open and large-scale settings of VoIP infrastructu...
Software systems in safety-critical industrial automation systems, such as power plants and steel mills, become increasingly large, complex, and distributed. For assessing risks, l...
— This paper is intended to compare the performance of four different types of fuzzy aggregation methods in classification of epilepsy risk levels from EEG Signal parameters. The...