Learn More
This paper presents a novel framework for network security, and provides a complete solution to integrated security policies, which meets the objectives of an organisation, and also an automated verification process. The framework uses a security compiler, which converts high-level abstract definitions of the objectives of an organisation, and its security(More)
I. ABSTRACT Forensics investigations can be flawed for many reasons, such as that they can lack any real evidence of an incident. Also, it can be the case that the legal rights of an individual has been breached, or that the steps taken in the investigation cannot be verified. This paper outlines an integrated framework for both data gathering, using mobile(More)
Many computing-related programmes and modules have many problems caused with large class sizes, large-scale plagiarism, module franchising, and an increasing requirement from students for increased amounts of hands-on, practical work. This paper presents a practical computer networks module which uses a mixture of on-line examinations and a practical(More)
  • 1