It is a common phenomenon for research projects to collect and analyse valuable data using ad-hoc information systems. These costly-to-build systems are often composed of incompat...
Radu Calinescu, Steve Harris, Jeremy Gibbons, Jim ...
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Recent efforts attempt to combine together information of different passive methods. Critical issues in this research are the choice of data and how to combine such data in order ...
Network approaches in Current Research Information Systems support the shift from a document-centric to a data-centric view, which acknowledges the primacy of data in the scientif...
: The management of engineering assets such as facilities and equipments can be a challenging task and optimising their usage is critical. To ensure effective utilization of an ass...
Mohamed-Zied Ouertani, Ajith K. Parlikad, Duncan M...