To facilitate rational decision making regarding cyber security investments, decision makers need to be able to assess expected losses before and after potential investments. This...
Network administrators are faced with the increasingly challenging task of monitoring their network’s health in real time, drawing upon diverse and voluminous measurement data fe...
Lukasz Golab, Theodore Johnson, Subhabrata Sen, Je...
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Topic maps provide exciting opportunities not just to make information easier to find, but to increase the usability of software. In order to provide users with the information th...