Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
This paper introduces a new approach for visualizing multidimensional time-referenced data sets, called Circle View. The Circle View technique is a combination of hierarchical vis...
The complexity and size of data is rapidly increasing in modern science, business and engineering. This has resulted in increasing demands for more sophisticated data analysis met...
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...
Information Technology has become a core activity in most, if not all, corporations. Although IT managers continue to be under-represented in executive management, the very centra...