University of Limerick Institutional Repository

Browsing LERO - UL authors by Subject "adaptive software"

DSpace Repository

Browsing LERO - UL authors by Subject "adaptive software"

Sort by: Order: Results:

  • Pasquale, Liliana; Hanvey, Sorren; Mcgloin, Mark; Nuseibeh, Bashar (Elsevier, 2016)
    The increase in crimes targeting the cloud is increasing the amount of data that must be analysed during a digital forensic investigation, exacerbating the problem of processing such data in a timely manner. Since collecting ...
  • Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Nuseibeh, Bashar (2012)
    Despite the benefits offered by smart grids, energy producers, distributors and consumers are increasingly concerned about possible security and privacy threats. These threats typically manifest themselves at runtime ...
  • Djahel, Soufiene; Salehie, Mazeiar; Tal, Irina; Jamshidi, Pooyan (IEEE Computer Society, 2013)
    Rapid increase in number of vehicles on the roads as well as growing size of cities have led to a plethora of challenges for road traffic management authorities such as traffic congestion, accidents and air pollution. ...
  • Omoronyia, Inah; Pasquale, Liliana; Salehie, Mazeiar; Cavallaro, Luca; Doherty, Gavin; Nuseibeh, Bashar (Association for Computing Machinery, 2012)
    In a dynamic environment where context changes frequently, users’ privacy requirements can also change. To satisfy such changing requirements, there is a need for continuous analysis to discover new threats and possible ...
  • Pasquale, Liliana; Mazeiar, Salehie; Ali, Raian; Omoronyia, Inah; Nuseibeh, Bashar (IEEE Computer Society, 2012)
    Adaptive security aims to protect valuable assets managed by a system, by applying a varying set of security controls. Engineering adaptive security is not an easy task. A set of effective security countermeasures should ...
  • Derakhshanmanesh, Mahdi; Salehie, Mazeiar; Jürgen, Ebert (Association for Computing Machinery, 2012)
    Access control systems are deployed in organizations to protect critical cyber-physical assets. These systems need to be adjustable to cope with di erent contextual factors like changes in resources or requirements. ...

Search ULIR


My Account