Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Everetts, Roxanne
National Defense University
Washington, District of Columbia
 
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 4 of 4 reviews

   
   The error of futurism: prediction and computer ethics
Horner D. ACM SIGCAS Computers and Society 32(7): 42004.  Type: Article

Computer ethics seeks to reduce the unintended or undesirable consequences of technology through accurate prediction. In this paper, Horner argues that predictive modeling does not provide any protection against future risk. Rather, he...

Apr 30 2004  
  A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment
Iheagwara C., Blyth A., Singhal M. Journal of Computer Security 11(1): 1-33, 2003.  Type: Article

Iheagwara, Blyth, and Singhal report on an experimental evaluation study of gigabit intrusion detection system (IDS) performance. The authors argue that the ability of IDSs to detect attacks is greatly affected by bandwidth utilization...

Aug 26 2003  
  A secure address resolution protocol: an efficient, transparent and easy to use cluster operating system
Gouda M., Huang C. Computer Networks 41(1): 57-71, 2003.  Type: Article

Gouda and Huang report on an architecture that they have developed to securely resolve Internet protocol (IP) addresses into hardware addresses over an ethernet connection. They argue that the address resolution protocol (ARP) currentl...

Jun 18 2003  
  The economics of information security investment
Gordon L., Loeb M. ACM Transactions on Information and System Security 5(4): 438-457, 2002.  Type: Article, Reviews: (1 of 3)

Gordon and Loeb report on a model that they have developed to evaluate how much information security is needed to protect data assets, and to determine the optimal investment, given the value of the assets and their vulnerability. The...

Jan 3 2003  
 
 
   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy