Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the secur...
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
Abstract. Large document collections, such as those delivered by Internet search engines, are difficult and time-consuming for users to read and analyse. The detection of common an...
Abstract. Context-aware systems incorporate multimodal information to analyze contextual information in users’ environment and provide various proactive services according to dyn...
Security is a crucial aspect in any modern software system. To ensure security in the final product, security requirements must be considered in the entire software development p...
Poster. We highlight the latest developments in the Argos project. First, we describe our approach to automatic workflow composition. Second, we discuss the validation of the fre...