Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Due to the increasing use of service level agreements for the provisioning of IT services, providers have to ensure that the guarantees for the quality of their offered services, ...
There is a growing interest into non-visual forms of data communication, not only driven by the need for accessible representations but also because researchers are realizing the ...
This paper applies Lehman's theory of software evolution to analyse the characteristics of web-based applications and identifies the essences and incidents that cause difficu...
Current annotation technologies suffer from poor coverage over the development process phases, limited support for the broad scope of the security requirement types and inadequate...