|
|
|
|
|
|
Date Reviewed |
|
|
1 - 4 of 4
reviews
|
|
|
|
|
|
|
|
The error of futurism: prediction and computer ethics Horner D. ACM SIGCAS Computers and Society 32(7): 42004. Type: Article
Computer ethics seeks to reduce the unintended or undesirable consequences of technology through accurate prediction. In this paper, Horner argues that predictive modeling does not provide any protection against future risk. Rather, he...
|
Apr 30 2004 |
|
|
|
|
|
|
A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment Iheagwara C., Blyth A., Singhal M. Journal of Computer Security 11(1): 1-33, 2003. Type: Article
Iheagwara, Blyth, and Singhal report on an experimental evaluation study of gigabit intrusion detection system (IDS) performance. The authors argue that the ability of IDSs to detect attacks is greatly affected by bandwidth utilization...
|
Aug 26 2003 |
|
|
|
|
|
|
A secure address resolution protocol: an efficient, transparent and easy to use cluster operating system Gouda M., Huang C. Computer Networks 41(1): 57-71, 2003. Type: Article
Gouda and Huang report on an architecture that they have developed to securely resolve Internet protocol (IP) addresses into hardware addresses over an ethernet connection. They argue that the address resolution protocol (ARP) currentl...
|
Jun 18 2003 |
|
|
|
|
|
|
The economics of information security investment Gordon L., Loeb M. ACM Transactions on Information and System Security 5(4): 438-457, 2002. Type: Article, Reviews: (1 of 3)
Gordon and Loeb report on a model that they have developed to evaluate how much information security is needed to protect data assets, and to determine the optimal investment, given the value of the assets and their vulnerability. The...
|
Jan 3 2003 |
|
|
|
|
|
|
|
|
|
|
|