Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
— With the advent of service sensitive applications such as remote controlled experiments, time constrained massive data transfers, and video-conferencing, it has become apparent...
Chin Guok, David W. Robertson, Mary R. Thompson, J...
Although virtual organizations and networks have been studied for quite some time, there is still need for research regarding their inner dynamics and the mechanisms of leadership...
In the Museum of Pure Form, we explore a novel way of presenting art to visitors of a museum, allowing them to virtually touch artefacts in a virtual museum. In order to realise t...
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...