Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Vulnerability scanning is one of the proactive information security technologies in the Internet and network security domain. However, the current vulnerability scanner (VS) produ...
In this paper a framework for a high-confidence e-healthcare information system which meets five criteria including availability, reliability, security, survivability and restorab...
Mass, multi-channel, network access to information requires a solution of several problems related to proper information delivery, including an important problem of adjusting data...
One of the major challenges facing information systems today is that of finding relevant information to satisfy a user's request and presenting it in a preferred form. The po...