Anomaly Detection in Computer Networks: A State-of-the-Art Review
A Model-Driven Approach to Noninterference
Supporting Common Criteria Security Analysis with Problem Frames
Genie in a Model? Why Model Driven Security will not secure your Web Application
Invalidating Policies using Structural Information
Evaluating data utility of privacy-preserving pseudonymized location datasets
Plausibilistic Entropy and Anonymity
Secure and Scalable Multimedia Sharing between Smart Homes