Abstract: Protecting cloud applications is critical in an era where security threats are increasingly sophisticated and persistent. Continuous Integration and Continuous Deployment (CI/CD) pipelines ...
C5-DEC CAD (part of CyFORT/IPCEI-CIS): AI-enabled toolkit for secure system design, development and evaluation following Common Criteria — CCT (SFR/SAR, ETR), SSDLC, SpecEngine/DocEngine, CRA ...
Abstract: The rapid growth of crypto asset adoption in Indonesia is accompanied by a rising trend of negative user reviews on application platforms, highlighting a critical need to understand user ...
This is a public repository for the master's thesis in Business Analytics and Management at the Rotterdam School of Management (RSM). This repository contains all scripts relevant to the research on ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results