Insider attacks are a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who abuse their privileges, and given their famil...
The fulfillment of time requirements is one of the major acceptance criteria of safety-critical and real-time systems. They are dictated by the environment of these systems and a...
In this paper we report early findings from a sample of Australian participants using Nokia’s Lifeblog software on mobile phones to record aspects of living and learning in both...
Abstract. There is an increasing need to provide methods for describing information systems which incorporate the integrated use of multiple channels of interaction. To achieve thi...
Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the r...
Boanerges Aleman-Meza, Phillip Burns, Matthew Eave...