: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
In this paper we will concentrate on the conceptual modeling and semantics of service delegation and alignment in information systems. In delegation, one typically has the situatio...
Herman Balsters, G. B. Huitema, Nicolae B. Szirbik
CALLAWAY, ROBERT DAVID. An Autonomic Service Delivery Platform for Service-Oriented Network Environments. (Under the direction of Michael Devetsikiotis and Yannis Viniotis.) Servi...
Robert D. Callaway, Michael Devetsikiotis, Yannis ...
: Communication processes have become increasingly important in modern working life. Organizations invest a surprisingly high amount of financial resources and employee work time i...
A legacy system is an operational, large-scale software system that is maintained beyond its first generation of programmers. It typically represents a massive economic investmen...
Kostas Kontogiannis, Renato de Mori, Morris Bernst...