— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
Abstract: Success of IT security not only depends on the evolution of technologies, but also relies on the knowledge of IT-Personnel and the level of their IT-security education. I...
In the emerging field of E-Commerce we show the great potential interest to create 3D virtual shopping centers. The study of a specific application: the creation of an electric ho...
Many of today's virtual environment applications, such as massively multi-player online games, involve a large and rapidly changing set of users. The server-based architectur...
This paper investigates what it entails to provide I/O service differentiation and performance isolation for virtual machines on individual multicore nodes in cloud platforms. Sh...