|
1-10 of 29 reviews |
Date Reviewed | |
|
Data science data governance Kroll J. IEEE Security and Privacy 16(6): 61-70, 2018. Type: Article
Recent advances in machine learning, data analytics, and artificial intelligence (AI) have empowered human beings to automatically make decisions by processing vast amounts of data much more efficiently than ever before. Along with gre...
|
Sep 23 2019 |
|
|
Security challenges and opportunities of software-defined networking Dacier M., König H., Cwalinski R., Kargl F., Dietrich S. IEEE Security and Privacy 15(2): 96-100, 2017. Type: Article
Software-defined networking (SDN) is becoming a new paradigm for computer networks, gaining popularity in industry and academia alike. While SDN introduces new capabilities to traditional networking, it also adds complexity. Among many...
|
Aug 3 2018 |
|
|
Anonymous and distributed community cyberincident detection Harrison K., White G. IEEE Security and Privacy 11(5): 20-27, 2013. Type: Article
Countering cyberattacks on specific communities requires community cooperation. The success of community cooperation depends on an anonymous and scalable information architecture....
|
Jul 17 2014 |
|
|
Targeted cyberattacks: a superset of advanced persistent threats Sood A., Enbody R. IEEE Security and Privacy 11(1): 54-61, 2013. Type: Article
Insight into the many threats that lurk in our software is presented in this paper. It also provides a useful introduction to the state of the art of malware. It will be especially useful for those doing research on malware or for prac...
|
May 16 2014 |
|
|
Blaming noncompliance is too convenient: What really causes information breaches? Renaud K. IEEE Security and Privacy 10(3): 57-63, 2012. Type: Article
Information leaks caused by malicious insiders account for approximately 60 percent of all losses from security attacks. In many (if not all) cases, existing security rules should have prevented the incident. So, what is wrong with cur...
|
Oct 17 2012 |
|
|
Holistically building the cybersecurity workforce Hoffman L., Burley D., Toregas C. IEEE Security and Privacy 10(2): 33-39, 2012. Type: Article
Most if not all members of the cybersecurity workforce are autodidacts. They rolled into security from another discipline, learned on the job, took a few courses, and attended seminars and conferences. Now, they are security profession...
|
Aug 10 2012 |
|
|
Security risk management using incentives Liu D., Li N., Wang X., Camp J. IEEE Security and Privacy 9(6): 20-28, 2011. Type: Article
Insider threats, whether malicious or inadvertent, are a major security and privacy concern in computer and information systems. Access controls that are too restrictive could prevent useful and necessary user behaviors from taking pla...
|
Apr 3 2012 |
|
|
Google Android: a comprehensive security assessment Shabtai A., Fledel Y., Kanonov U., Elovici Y., Dolev S., Glezer C. IEEE Security and Privacy 8(2): 35-44, 2010. Type: Article
Smartphones are no longer just cool devices for a select few. Recent advancements in mobile technology and competition between the largest high-tech organizations have created an ecosystem where many existing applications can be ported...
|
Nov 5 2010 |
|
|
The virtualization solution Cohen F. IEEE Security and Privacy 8(3): 60-63, 2010. Type: Article
Is virtualization the answer to computer security? Cohen competently demonstrates the fallacy of thinking so. He summarizes the history of “silver bullet” solutions to computer security, showing how first operating ...
|
Nov 4 2010 |
|
|
Hide and seek in the cloud Blumenthal M. IEEE Security and Privacy 8(2): 57-58, 2010. Type: Article
This article highlights some of the risks that users might face when employing cloud services. Clearly, cloud computing concentrates data and applications on servers, which therefore become interesting targets for attackers. Since one ...
|
Aug 2 2010 |
|
|
|
|
|
|
|
|