Eye-tracking equipment is used to assess how well a subject comprehends UML class diagrams. The results of a study are presented in which eye movements are captured in a non-obtru...
Shehnaaz Yusuf, Huzefa H. Kagdi, Jonathan I. Malet...
In this paper we present clustering analysis of sessionbased Web workloads of eight Web servers using the intrasession characteristics (i.e., number of requests per session, sessi...
In this paper, we propose three metrics for detecting botnets through analyzing their behavior. Our social infrastructure (i.e., the Internet) is currently experiencing the danger...
Crosscutting concerns consist in software system features having the implementation spread across modules as tangled and scattered code. In many cases, these crosscutting concerns...
Lerina Aversano, Luigi Cerulo, Massimiliano Di Pen...
—In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements sinc...