: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Rapid system understanding is required in the planning, feasibility assessment and cost estimating phases of a system renovation project. In this paper, we apply a number of analy...
: One of the main challenges in distributed software development is the elicitation and management of knowledge regarding system requirements. Due to spatial distribution of involv...
Scenarios are widely and successfully used to discover requirements for software-intensive systems. Recent advances in mobile computing technologies mean that mobile tools can sup...
: This paper describes a research project that was carried out to determine and evaluate the learning environment customisations required to support selfmotivated, able, and experi...