—As e-Business and e-Commerce applications are increasingly exposed to a variety of information security threats, corporate decision makers are increasingly forced to pay attenti...
Abstract. Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more ...
The next development in building Bayesian networks will most likely entail constructing multipurpose models that can be employed for varying tasks and by different types of user. ...
Hermina J. M. Tabachneck-Schijf, Linda C. van der ...
Abstract. The term of a "process" is used in Software Engineering (SE) theories and practices in many different ways, which cause confusion. In this paper we will firstly...
The vision of the Semantic Web can only be realized through proliferation of well-known ontologies describing different domains. To enable interoperability in the Semantic Web, it...
Alexander Maedche, Boris Motik, Ljiljana Stojanovi...