Incident Response has always been an important aspect of Information Security but it is often overlooked by security administrators. Responding to an incident is not solely a techn...
—As e-Business and e-Commerce applications are increasingly exposed to a variety of information security threats, corporate decision makers are increasingly forced to pay attenti...
We present a novel approach to visually locate bodies of research within the sciences, both at each moment of time and dynamically. This article describes how this approach fits w...
We have developed a computational framework to characterize social network dynamics in the blogosphere at individual, group and community levels. Such characterization could be us...
Munmun De Choudhury, Hari Sundaram, Ajita John, Do...
Free and open source software is more and more used for software developments on UNIX systems. We are proposing a solution to control the deployment of free software in the context...
Laurent Charles, Manuel Vacelet, Mohamed Chaari, M...