Abstract—In recent years, cost-sensitive intrusion response has gained significant interest, mainly due to its emphasis on the balance between potential damage incurred by the i...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...
Early detection of problems within a code base can save much effort and associated cost as time progresses. One method of performing routine assessment of code with a view to pre-...
Organizations often need to release microdata without revealing sensitive information. To this scope, data are anonymized and, to assess the quality of the process, various privac...
There is no standard model for judging the maturity of the software processes followed in software project outsourcing. The aim of this work is to describe a possible approach for...
The notion of trust has been virtually absent from most work on how people assess and choose their information sources. Based on two empirical cases this study shows that software ...
Morten Hertzum, Hans H. K. Andersen, Verner Anders...