Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Hartel, Pieter
Univ. of Twente
Enschede, Netherlands
 
   Reviewer Selected
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 5 of 5 reviews

   
  The basics of hacking and penetration testing: ethical hacking and penetration testing made easy
Engebretson P., Syngress Publishing, Waltham, MA, 2011. 180 pp.  Type: Book (978-1-597496-55-1)

This is a book on the “dark side” of information technology, as it describes how the vulnerabilities of systems and networks can be exploited to gain unauthorized access. It is important that students and practition...

May 30 2012  
  Smartening the crowds: computational techniques for improving human verification to fight phishing scams
Liu G., Xiang G., Pendleton B., Hong J., Liu W.  SOUPS 2011 (Proceedings of the 7th Symposium on Usable Privacy and Security, Pittsburgh, PA, Jul 20-22, 2011) 1-13, 2011.  Type: Proceedings

A good phishing site should resemble the target site as much as possible, and it should hide the differences with the target site, at least to the unsuspecting user. This paper leverages this observation to cluster similar suspected ph...

Feb 9 2012  
  Privacy-preserving network forensics
Afanasyev M., Kohno T., Ma J., Murphy N., Savage S., Snoeren A., Voelker G. Communications of the ACM 54(5): 78-87, 2011.  Type: Article

The Internet offers users some anonymity; at the network level, an Internet protocol (IP) address is only loosely associated with a device, and is not associated with a person. This article proposes the use of group signatures to bind ...

Jul 18 2011  
  School of phish: a real-world evaluation of anti-phishing training
Kumaraguru P., Cranshaw J., Acquisti A., Cranor L., Hong J., Blair M., Pham T.  SOUPS 2009 (Proceedings of the 5th Symposium on Usable Privacy and Security, Mountain View, CA, Jul 15-17, 2009) 1-12, 2009.  Type: Proceedings

The well-designed “school of phish” experiment compares to what extent three groups, of about 170 participants each, fall for phishing scams. The control group received no training, one group was trained once, and t...

Jan 19 2010  
   Overcoming the insider: reducing employee computer crime through situational crime prevention
Willison R., Siponen M. Communications of the ACM 52(9): 133-137, 2009.  Type: Article

Situational crime prevention (SCP) is a criminological theory, proposed by Ronald Clarke in the 1980s and developed over the last 30 years, that focuses on the crime event rather than the criminal. A number of highly effective crime pr...

Nov 2 2009  
 
 
   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy