• Conference Object  

      Human Mobility Computing and Privacy: Fad or Reality? 

      Lee, A. J.; Pelechrinis, K.; Zeinalipour-Yazdi, Constantinos D. (Institute of Electrical and Electronics Engineers Inc., 2015)
      The advent of mobile computing and sensing technologies, in conjunction with omni-present and high-speed mobile networks, allow nowadays the capture of human mobility data at an extremely high fidelity. Modern mobile ...
    • Conference Object  

      Opacity formulations and verification in discrete event systems 

      Hadjicostis, Christoforos N.; Keroglou, C. (Institute of Electrical and Electronics Engineers Inc., 2014)
      In many emerging security applications, a property of a system, that may reveal important details about its behaviour, needs to be kept secret (opaque) to outside observers (intruders). Motivated by such applications, ...
    • Article  

      Using argumentation logic for firewall policy specification and analysis 

      Bandara, A. K.; Kakas, Antonis C.; Lupu, E. C.; Russo, A. (2006)
      Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. Given their widespread use, it is crucial that ...