Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
IEEE Security and Privacy
I E E E
 
   
 
Options:
 
  1-10 of 29 reviews Date Reviewed 
  Data science data governance
Kroll J. IEEE Security and Privacy 16(6): 61-70, 2018.  Type: Article

Recent advances in machine learning, data analytics, and artificial intelligence (AI) have empowered human beings to automatically make decisions by processing vast amounts of data much more efficiently than ever before. Along with gre...

Sep 23 2019
  Security challenges and opportunities of software-defined networking
Dacier M., König H., Cwalinski R., Kargl F., Dietrich S. IEEE Security and Privacy 15(2): 96-100, 2017.  Type: Article

Software-defined networking (SDN) is becoming a new paradigm for computer networks, gaining popularity in industry and academia alike. While SDN introduces new capabilities to traditional networking, it also adds complexity. Among many...

Aug 3 2018
  Anonymous and distributed community cyberincident detection
Harrison K., White G. IEEE Security and Privacy 11(5): 20-27, 2013.  Type: Article

Countering cyberattacks on specific communities requires community cooperation. The success of community cooperation depends on an anonymous and scalable information architecture....

Jul 17 2014
   Targeted cyberattacks: a superset of advanced persistent threats
Sood A., Enbody R. IEEE Security and Privacy 11(1): 54-61, 2013.  Type: Article

Insight into the many threats that lurk in our software is presented in this paper. It also provides a useful introduction to the state of the art of malware. It will be especially useful for those doing research on malware or for prac...

May 16 2014
  Blaming noncompliance is too convenient: What really causes information breaches?
Renaud K. IEEE Security and Privacy 10(3): 57-63, 2012.  Type: Article

Information leaks caused by malicious insiders account for approximately 60 percent of all losses from security attacks. In many (if not all) cases, existing security rules should have prevented the incident. So, what is wrong with cur...

Oct 17 2012
  Holistically building the cybersecurity workforce
Hoffman L., Burley D., Toregas C. IEEE Security and Privacy 10(2): 33-39, 2012.  Type: Article

Most if not all members of the cybersecurity workforce are autodidacts. They rolled into security from another discipline, learned on the job, took a few courses, and attended seminars and conferences. Now, they are security profession...

Aug 10 2012
  Security risk management using incentives
Liu D., Li N., Wang X., Camp J. IEEE Security and Privacy 9(6): 20-28, 2011.  Type: Article

Insider threats, whether malicious or inadvertent, are a major security and privacy concern in computer and information systems. Access controls that are too restrictive could prevent useful and necessary user behaviors from taking pla...

Apr 3 2012
   Google Android: a comprehensive security assessment
Shabtai A., Fledel Y., Kanonov U., Elovici Y., Dolev S., Glezer C. IEEE Security and Privacy 8(2): 35-44, 2010.  Type: Article

Smartphones are no longer just cool devices for a select few. Recent advancements in mobile technology and competition between the largest high-tech organizations have created an ecosystem where many existing applications can be ported...

Nov 5 2010
  The virtualization solution
Cohen F. IEEE Security and Privacy 8(3): 60-63, 2010.  Type: Article

Is virtualization the answer to computer security? Cohen competently demonstrates the fallacy of thinking so. He summarizes the history of “silver bullet” solutions to computer security, showing how first operating ...

Nov 4 2010
  Hide and seek in the cloud
Blumenthal M. IEEE Security and Privacy 8(2): 57-58, 2010.  Type: Article

This article highlights some of the risks that users might face when employing cloud services. Clearly, cloud computing concentrates data and applications on servers, which therefore become interesting targets for attackers. Since one ...

Aug 2 2010
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy