A few years ago a portal for bachelor and master theses from Flemish university colleges was established by means of the open source repository software DoKS. At present approxima...
Anomalous communication patterns are one of the leading indicators of computer system intrusions according to the system administrators we have interviewed. But a major problem is...
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
Enriching Web applications with personalized data is of major interest for facilitating the user access to the published contents, and therefore, for guaranteeing successful user ...
This paper describes the design and operation of the OMII web site, which has to date achieved three major targets. The first target is the successful integrations in different te...