The article employs deep log analysis (DLA) techniques, a more sophisticated form of transaction log analysis, to demonstrate what usage data can disclose about information seekin...
David Nicholas, Paul Huntington, Hamid R. Jamali M...
Abstract--In both the commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information. In this paper we address the threat of infor...
Janusz Marecki, Mudhakar Srivatsa, Pradeep Varakan...
Suppose the information hider has a set of information hiding schemes to be employed in the presence of a set of steganalysis detectors. Let the information hider have only an inc...
The proposed research defines an approach to combine Information Retrieval based analysis of the textual information embedded in software artifacts with program static and dynamic...
- In this paper we consider the synergy between two areas of IS literature: that concerned with the evaluation of information systems and that concerned with explaining the phenome...
Paul Beynon-Davies, Ian Owens, Michael Lloyd-Willi...