-
1
Trusting Cloud Computing for Personal Files
Published 2014“…In a recent research study concerning current and future (state-of-the-art) cloud security issues, we recognized a substantive number of security loopholes in information technology systems, and devised relevant solutions for such problems. …”
Get full text
Conference or Workshop Item -
2
CASI Method for Improving the Usability of IDS
Published 2015“…The similarities and differences of usability evaluation methods and usability problems are summarized on the basis of usability factors, current evaluation methods and interfaces loopholes.…”
Get full text
Article -
3
Linking integrity with road pricing cause-and-effect model: A system dynamics simulation approach
Published 2022“…As a result, authorities should place a greater emphasis on these loopholes, as they will inevitably result in unexpected changes. …”
Get full text
Article