Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Software (D) > Operating Systems (D.4) > Security and Protection (D.4.6)
 
  Security and Protection (D.4.6) See Reviews  
 
Subject Descriptors:
Access Controls (121)
Authentication (48)
Cryptographic Controls (84)
Information Flow Controls (29)
Invasive Software (32)
Security Kernels (6)
Verification (10)
 
Proper Nouns:
Xenix (1)
 
 
Reviews limited to:
 
 

Reviews about "Security and Protection (D.4.6)":
A survey on malware detection using data mining techniques
Ye Y., Li T., Adjeroh D., Iyengar S.  ACM Computing Surveys 50(3): 1-40, 2017. Type: Article
Designing password policies for strength and usability
Shay R., Komanduri S., Durity A., Huh P., Mazurek M., Segreti S., Ur B., Bauer L., Christin N., Cranor L.  ACM Transactions on Information and System Security 18(4): Article No. 13, 2016. Type: Article
Predicting cyber attacks with Bayesian networks using unconventional signals
Okutan A., Yang S., McConky K.  CISRC 2017 (Proceedings of the 12th Annual Cyber and Information Security Research Conference, Oak Ridge, TN,  Apr 4-6, 2017) 1-4, 2017. Type: Proceedings
Model checking Petri nets with names using data-centric dynamic systems
Montali M., Rivkin A.  Formal Aspects of Computing 28(4): 615-641, 2016. Type: Article
Toward engineering a secure Android ecosystem: a survey of existing techniques
Xu M., Song C., Ji Y., Shih M., Lu K., Zheng C., Duan R., Jang Y., Lee B., Qian C., Lee S., Kim T.  ACM Computing Surveys 49(2): 1-47, 2016. Type: Article
Intercrossed access controls for secure financial services on multimedia big data in cloud systems
Li Y., Gai K., Ming Z., Zhao H., Qiu M.  ACM Transactions on Multimedia Computing, Communications, and Applications 12(4s): 1-18, 2016. Type: Article
The risks of self-auditing systems
Mercuri R., Neumann P.  Communications of the ACM 59(6): 22-25, 2016. Type: Article
more...
Related Topics
D.4.6 Security and Protection
  - Security and Protection
   
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy