Table of contents
Keystroke dynamics on a mobile handset: a feasibility study
N.L. Clarke, S.M. Furnell, B.M. Lines, P.L. ReynoldsThe ability of third generation telephones to store sensitive information, such as financial records, digital certificates and company records, makes them desirable targets for…
Implications of ICT for knowledge management in globalization
Jimmy J.M. Ng, K.X. LiThe purpose of this paper is to critically review the model of Hendriks and examine its suitability for the relationship of organizational knowledge management and information and…
Intrusion detection: the art and the practice. Part I
Joseph S. Sherif, Rod Ayers, Tommy G. DearmondOrganizations more often than not lack comprehensive security policies and are not adequately prepared to protect their systems against intrusions. This paper puts forward a…
A novel approach to solve DSL network data rate problems
Raju RamaswamyDigital subscriber line (DSL) is a service that offers much faster Internet connection than a standard dial up connection. Crosstalk is a major impairment in DSL telecommunication…
Identifying security vulnerabilities through input flow tracing and analysis
Simeon Dimitriou XenitellisA software system can be considered as a collection of data and procedures that are separated from the environment and interact with it through channels of communication. If we…