The concept of the Virtual Software Corporation (VSC) has recently become a practical reality as a result of advances in communication and distributed technologies. However, there...
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge o...
In recent literature it is commonly agreed that the first phase of the software development process is still an area of concern. Furthermore, while software technology has been ch...
Non-stop and highly available applications need to be dynamically adapted to new conditions in their execution environment, to new user requirements or to some situations usually u...