Learn More
Network Host Application security Dynamic link libraries System calls a b s t r a c t Intrusion detection has emerged as an important approach to network, host and application security. Network security includes analysing network packet payload and other inert network packet profiles for intrusive trends; whereas, host security may employ system logs for(More)
This paper describes the practical results of an experiment created in order to analyze the software process improvement by the use of the practices and rules of Extreme Programming methodology. In the experiment a group of 40 students in the Universidad Autónoma de Aguascalientes took part to create a small system, to measure their productivity and to(More)
  • 1