Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
Conversational recommender systems help to guide users through a product-space towards a particular product that meets their specific requirements. During the course of a “conve...
Kevin McCarthy, James Reilly, Lorraine McGinty, Ba...
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
The interest in network virtualization has been growing steadily among the networking community in the last few years. Network virtualization opens up new possibilities for the ev...
A search engine that can handle TV programs and Web content in an integrated way is proposed. Conventional search engines have been able to handle Web content and/or data stored i...