Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Space applications’ users have been relying for the past decades on custom developed software tools capable of addressing short term necessities during critical Spacecraft contro...
Eye tracking has long held the promise of being a useful methodology for human computer interaction. However, a number of barriers have stood in the way of the integration of eye ...
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Through a study of web site design practice, we observed that web site designers employ multiple representations of web sites as they progress through the design process, and that...