Consumer adoption of e-services is an important goal for many service providers, however little is known about how different consumer segments perceive and evaluate them for adopt...
The success of distributed event-based infrastructures such as SIENA and Elvin is partially due to their ease of use. Even novice users of these infrastructures not versed in distr...
This paper provides an overview of current and potential future spam filtering approaches. We examine the problems spam introduces, what spam is and how we can measure it. The pap...
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
In this paper we analyze the influence of the frequency of sensor data readings on the behaviours of a Robotic System (RS). This is done in the framework of behaviour based archit...