We introduce tools to model and describe phishing attacks, allowing a visualization and quantification of the threat on a given complex system of web services. We use our new mod...
Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation atta...
The analysis in this paper demonstrates that a combination of 1) a forward contact, with fixed price for both base land and peaking power, and 2) a collar option for the number of...
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive...
In this paper we discuss a rigorous foundation of similarity reasoning based on the concept of utility. If utility is formulated in mathematical terms it can serve as a formal spe...