Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Recent research on point-based surface representations suggests that point sets may be a viable alternative to parametric surface representations in applications where the topolog...
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Stochastic Local Search (SLS) is quite effective for a variety of Combinatorial (Optimization) Problems (COP). However, the performance of SLS depends on several factors and getti...