Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Marien, Andre
K.U.Leuven
Leuven, Belgium
 
   Featured Reviewer
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

André Mariën has over 40 years of experience in information technology (IT) and information security. Over the last 25 years he has focused exclusively on security. His experience includes risk management, security policies, legal and contractual aspects, awareness programs, 360-degree reviews, security architecture, designs and implementation focusing on security, security in applications and infrastructure, public key infrastructure (PKI), forensics, and identity and access management (IAM).

André obtained a master-after-master in enterprise architecture and taught enterprise security architecture for a master’s program. His job brought him to places in Europe, the US, and Asia.

He is a long-time reviewer of articles and books for ACM Computing Reviews, covering a very broad spectrum of security publications. He has been a staff member of the KU Leuven Department of Computer Science since he graduated and is completing his final year as a professor.

 
 
Options:
Date Reviewed  
 
1
- 5 of 5 reviews

   
   The art of immutable architecture
Perry M., Apress, New York, NY, 2020. 444 pp.  Type: Book (978-1-484259-54-2)

Here is a crazy idea: imagine an information technology (IT) solution where the only persistent memory is write-once, read-many (WORM), or a database without update and delete commands. This book claims such immutable data stores form ...

Aug 19 2021  
   An army of me: sockpuppets in online discussion communities
Kumar S., Cheng J., Leskovec J., Subrahmanian V.  WWW 2017 (Proceedings of the 26th International World Wide Web Conference, Perth, Australia, Apr 3-7, 2017) 857-866, 2017.  Type: Proceedings

Online discussion platforms have become an important part of social life. However, they may be abused, for instance, to deceive and create an illusion of public consensus or save people from being banned, or to vandalize content on pla...

Jun 21 2021  
   Deception in the digital age: exploiting and defending human targets through computer-mediated communications
Malin C., Gudaitis T., Holt T., Kilger M., ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp.  Type: Book (978-0-124116-30-6), Reviews: (2 of 4)

The book’s ten chapters provide background on deception techniques and then examples linked to cyber deception. The introduction, “Cyberanthropology of Deception,” shows that deception is an old tactic, wi...

Jul 12 2018  
   One-time cookies: preventing session hijacking attacks with stateless authentication tokens
Dacosta I., Chakradeo S., Ahamad M., Traynor P. ACM Transactions on Internet Technology 12(1): 1-24, 2012.  Type: Article

The Web generally uses protocols that are essentially stateless, but applications often depend on context and prior actions. Web 2.0 further complicates how we must deal with the gap between stateless protocols and some notion of sessi...

Oct 8 2012  
   Cent, five cent, ten cent, dollar: hitting botnets where it really hurts
Ford R., Gordon S.  New security paradigms (Proceedings of the 2006 Workshop on New Security Paradigms, Germany, Sep 19-22, 2006) 3-10, 2007.  Type: Proceedings

Many sources have pointed out that malware has increasingly become an instrument for financial gain. This paper describes an approach to combat botnets from an economic, instead of a technical, angle. The authors look beyond basic malw...

Nov 14 2007  
 
 
   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy