Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computer Systems Organization (C) > Computer-Communication Networks (C.2) > General (C.2.0) > Security and Protection (C.2.0...)  
 
Options:
 
  1-10 of 774 Reviews about "Security and Protection (C.2.0...)": Date Reviewed
   An army of me: sockpuppets in online discussion communities
Kumar S., Cheng J., Leskovec J., Subrahmanian V.  WWW 2017 (Proceedings of the 26th International World Wide Web Conference, Perth, Australia,  Apr 3-7, 2017) 857-866, 2017. Type: Proceedings

Online discussion platforms have become an important part of social life. However, they may be abused, for instance, to deceive and create an illusion of public consensus or save people from being banned, or to vandalize content on platforms like ...

Jun 21 2021
  Deep learning applications for cyber security
Alazab M., Tang M.,  Springer International Publishing, New York, NY, 2019. 246 pp. Type: Book (978-3-030130-56-5)

Research in the field of artificial intelligence (AI) provides new information about deep neural network (DNN)-based methods, also known as deep learning. This allows computational models, composed of countless processing layers, to learn represen...

May 7 2021
   Data transparency with blockchain and AI ethics
Bertino E., Kundu A., Sura Z.  Journal of Data and Information Quality 11(4): 1-8, 2019. Type: Article

With the ever-growing use of digital technology, especially the use of big data technologies and machine learning, questions related to the proper use of data collected from social networks led to the introduction of data transparency. Hence, the ...

Apr 14 2021
  Data-driven model-based detection of malicious insiders via physical access logs
Cheh C., Thakore U., Fawaz A., Chen B., Temple W., Sanders W.  ACM Transactions on Modeling and Computer Simulation 29(4): 1-25, 2019. Type: Article

Employees with security clearance will perhaps continue to pose the ultimate security threat to businesses, organizations, and security researchers. What kinds of data and algorithms should be effectively used to monitor and thwart risky employees...

Mar 8 2021
  5G enabled secure wireless networks
Jayakody D., Srinivasan K., Sharma V.,  Springer International Publishing, New York, NY, 2019. 200 pp. Type: Book (978-3-030035-07-5)

Wireless 5G networks are widely deployed and, compared to previous generations, carry vastly augmented data flows with low latency. Thus, their security and privacy aspects warrant special attention [1], even if a vast number of standards have alr...

Jan 15 2021
  Computer security and the Internet
van Oorschot P.,  Springer International Publishing, New York, NY, 2020. 387 pp. Type: Book (978-3-030336-48-6), Reviews: (2 of 2)

Paul C. van Oorschot is a master who has made many diverse contributions to computer system security (very much including systems connected by the Internet), from applied cryptography to system usability. This range is a strength of the book: whil...

Jan 6 2021
  Computer security and the Internet
van Oorschot P.,  Springer International Publishing, New York, NY, 2020. 387 pp. Type: Book (978-3-030336-48-6), Reviews: (1 of 2)

Security is a hot, yet tough, topic these days. Computer security, in a broad sense, spans several interdisciplinary areas. It is sometimes difficult to identify good literature, both to grasp the essential ideas and to be able to teach them. This...

Jan 4 2021
  Big data privacy preservation for cyber-physical systems
Pan M., Wang J., Errapotu S., Zhang X., Ding J., Han Z.,  Springer International Publishing, New York, NY, 2019. 84 pp. Type: Book (978-3-030133-69-6)

This monograph gives an introduction to cyber-physical systems (CPS). These are systems that are controlled by computers and influence objects in the physical world. Areas discussed include spectrum trading (where specific radio frequencies are pu...

Nov 11 2020
   Modern debugging: the art of finding a needle in a haystack
Spinellis D.  Communications of the ACM 61(11): 124-134, 2018. Type: Article

The rapidly emerging smart Internet of Things (IoT) hardware and devices that make our lives comfortable and secure require faultless and reliable software. But what techniques and tools should programmers and software engineers be cognizant of to...

Oct 26 2020
  Guide to automotive connectivity and cybersecurity: trends, technologies, innovations and applications
Möller D., Haas R.,  Springer International Publishing, New York, NY, 2019. 645 pp. Type: Book (978-3-319735-11-5)

Information technology (IT) specialists are very involved in vehicle design and maintenance. The technologies that support modern engine monitoring, navigation, driver information, and safety systems would be unimaginable to earlier generations of...

Oct 9 2020
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy