Search
Now showing items 1-3 of 3
A Layered Security Approach for Cloud Computing Infrastructure
(IEEE, 2009)
This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service ...
Detection of hidden hostile/terrorist groups in harsh territories by using animals as mobile biological sensors
(MDPI, 2008)
Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist ...
A desktop application to learn the actual workload of the students
(ELSEVIER SCIENCE BV, 2009)
The use of European Credit Transfer system (ECTS) provides a reference standard for exchange students across the European Union (EU). It helps more transparency and compatibility to compare the self-study period and ...