Computers & Security. 4 (4): 269-286. doi:10.1016/0167-4048(85)90046-X. Dutch government scraps plans to use voting computers ... It is named after Dutch computer researcher Wim van Eck, who in 1985 published the first paper on it, including proof of ... Van Eck phreaking Demonstration Tempest for Eliza is a program that uses a computer monitor to send out AM radio signals, ... This caused the Dutch government to ban the use of NewVote computer voting machines manufactured by SDU in the 2006 national ...
Computer and Information Security Handbook. Morgan Kaufmann Publications. Elsevier Inc. p. 605. ISBN 978-0-12-374354-1. See, ... Computers & Security. 10 (8): 749-764. Howell, K. E. (2013) Introduction to the Philosophy of Methodology. London: Sage ...
A couple of early articles on computer security are list below: Gellman, Harvey S., How The Computer Can Be Used To Rob You ... "Computer security". acm.org. "Reviews of "Riding the Tiger"". eclicktick.com. Harvey S. Gellman at the Mathematics Genealogy ... He understood quite early that computers would play a major role in everyday life: "Eventually, Dr. Gellman believes, computers ... He also foresaw the commodification of computer software: "the computer use of pre-programmed application packages will become ...
Computers & Security. ScienceDirect. doi:10.1016/j.cose.2009.05.002. Jeremy Blosser and David Josephsen (November 2004). " ... This is a strategy used by ISPs to prevent the sending of spam from virus infected client computers. By contrast, an MSA must ... A message submission agent (MSA) or mail submission agent is a computer program or software agent that receives electronic mail ...
"Attackers hit Web hosting servers". Computers & Security. 22 (4): 273-283. doi:10.1016/s0167-4048(03)00402-4. InstantShift. "A ... The level of security that a web hosting service offers is extremely important to a prospective customer and can be a major ... To host a website on the internet, an individual or company would need their own computer or server. As not all companies had ... The company may use the computer as a website host to provide details of their goods and services and facilities for online ...
2014). "Covert Computation-Hiding code in code through compile-time obfuscation". Computers & Security. Andriesse, Dennis & ... 4th ACM conference on Data and application security and privacy. CS1 maint: Multiple names: authors list (link) Schrittwieser, ... Information Security and Cryptology. 10th International Conference, Inscrypt. 8957. Beijing, China: Springer International ... Lecture Notes in Computer Science. 13th International Conference Information Hiding. 6958. Springer Berlin Heidelberg. pp. 299- ...
Computers & Security. 31 (1): 83-95. doi:10.1016/j.cose.2011.10.007. Johnston, A. C.; Warkentin, M. (2010). "Fear appeals and ... The general idea here has been to use threats or information security policies to encourage protection security behaviors in ... 2015), returned to use of the full nomology and measurement of fear in an organizational security context with two studies. A ... Namely, researchers focusing on information security have applied protection motivation theory to their studies since the end ...
Any computer system that requires password authentication must contain a database of passwords, either hashed or in plaintext, ... The hash function H is unlikely to produce collisions as it is usually considered an important security feature not to do so, ... It is a practical example of a space-time tradeoff, using less computer processing time and more storage than a brute-force ... Lecture Notes in Computer Science. Santa Barbara, California, USA: Springer. ISBN 3-540-40674-3. Ophcrack page by Philippe ...
"Recommendation for Key Derivation Using Pseudorandom Functions (Revised)" (PDF). Computer Security. NIST. Andrade, E.; Jr, M. ... Lyra2 preserves the security, efficiency and flexibility of its predecessor, including: (1) the ability to configure the ... In addition, it brings important improvements when compared to its predecessor:[citation needed] it allows a higher security ... IEEE Transactions on Computers. PP (99): 1-1. doi:10.1109/TC.2016.2516011. ISSN 0018-9340. Percival, Colin. "Stronger Key ...
Data Exfiltration from Air-Gapped Computers over GSM Frequencies". 24th USENIX Security Symposium (USENIX Security 15). Guri, ... Computers & Security. Elsevier. 48: 74-91. doi:10.1016/j.cose.2014.10.016. O'Malley, Samuel Joseph; Choo, Kim-Kwang Raymond ( ... "How to leak sensitive data from an isolated computer (air-gap) to a near by mobile phone - AirHopper". BGU Cyber Security Labs ... Because most modern computers, especially laptops, have built-in microphones and speakers, air-gap malware can be designed to ...
"Expert Witness , Computer Expert Witness , Security Expert , Cyber Security Expert". Securityhaven.com. 2011-06-29. Retrieved ... "CERIAS : Security in a Changing World - 01/09/2008". Cerias.purdue.edu. 2008-01-09. Retrieved 2016-05-19. ... Network Security Bible, 2nd Edition; Insider Threat; and his forthcoming book, Online Danger: How to Protect Yourself and Your ...
Computers and Security. Elsevier, Science Direct. 28 (7): 683-697. doi:10.1016/j.cose.2009.03.006. Retrieved 9 December 2009. ... it may be the entire set of files on a computer) to the subset most likely to have been altered. The problem is generally ...
Computer security portal. ... Zerodium is an American information security company founded in ... Its main business is acquiring premium zero-day vulnerabilities with functional exploits from security researchers and ... companies, and reporting the research, along with protective measures and security recommendations, to its corporate and ...
Computer Network Security. Springer. pp. 298-307. doi:10.1007/b12005. ISBN 978-3-540-40797-3. Youngdai Ko; Changhoon Lee; ... Information Security and Privacy. Springer. pp. 137-148. doi:10.1007/b98755. ISBN 978-3-540-22379-5. ...
"Persona Management". Computer Fraud & Security. 2010 (11): 11-15. doi:10.1016/S1361-3723(10)70145-7. Alan Cooper: "The origin ...
Computer Security Articles. Retrieved December 26, 2010. Official website. ... Norman's Security Blog (December 10, 2010). "Updated Firmware Available... Oh yes, forgot to mention this: with a build in back ... The need of MalCon conference is bridge that ignored gap between security companies and malcoders. They have to get on a common ... Even if the available handful of security vendors have their own team of researchers for analysis, this is not enough. Active ...
Mansfield-Devine, Steve (December 2009). "Darknets". Computer Fraud & Security. 2009 (12): 4-6. doi:10.1016/S1361-3723(09)70150 ... Zeronet is open source software aimed to build an internet-like computer network of peer-to-peer users of Tor. RShare ( ... Darknets in general may be used for various reasons, such as: Computer crime (cracking, file corruption etc.) Protecting ... "Clearnet vs Hidden Services - Why You Should Be Careful". Jolly Roger's Security Guide for Beginners. DeepDotWeb. Retrieved 4 ...
Computer_security portal. ... Vupen Security was a French information security company ... which led to the release of various security updates from Adobe, Microsoft, Apple, Mozilla, and Google to address the reported ... along with protective measures and security recommendations, to its corporate and government clients. Registre des sociétés, ...
Computers & Security, Elsevier. Volume 30, Issue 6-7, Sep.-Oct. 2011. Brandner, M., Craes, M., Oellermann, F., Zimmermann, O., ... Each provider debates upon a lot of hows and whys like which service to expose, whom to give more importance: security or easy ... 36-41, IEEE Computer Society. Retrieved February 23, 2008. "Microservices: yesterday, today, and tomorrow" (PDF). Retrieved 6 ... Computer User. Page 20. Brayan Zimmerli (November 11, 2009) Business Benefits of SOA, University of Applied Science of ...
... was described by Paul Oldfield as "the first virus to spread rapidly by email". In the Computer Security Handbook, ... List of computer worms Timeline of computer viruses and worms Comparison of computer viruses E-mail spam Malware Stephen ... Chen, William W. L. (2005). Statistical methods in computer security. New York, N.Y: Marcel Dekker. p. 272. ISBN 0-8247-5939-7 ... ISBN 0-9538336-0-7. Bosworth, Seymour; Kabay, Michel E. (2002). Computer security handbook. Chichester: John Wiley & Sons. p. ...
Computers & Security, Elsevier. Volume 30, Issue 6-7, Sep.-Oct. 2011. Davis, Robert E. (2005). IT Auditing: An Adaptive Process ... The broad scope of auditing information security includes such topics as data centers (the physical security of data centers ... Installing controls are necessary but not sufficient to provide adequate security. People responsible for security must ... Certified Computer Professional (CCP) Certified Information Privacy Professional (CIPP) Certified Information Systems Security ...
Computers and Security. 53: 44-64. doi:10.1016/j.cose.2015.05.005. Knuth, Donald (1998). The Art of Computer Programming Vol. 2 ...
"In brief". Computer Fraud & Security. 2004 (5): 3. 2004. doi:10.1016/S1361-3723(04)00061-2. Basamanowicz, J.; Bouchard, M. ( ... The secret was that Strider worked in a computer store where he got the latest games. He then bribed a train conductor to ... In the UK, seven computers were seized and three arrests made in Belfast, Manchester and Sheffield. In Singapore, three people ... Police forces from eleven countries were involved, arresting about 120 people and seizing more than 200 computers (including 30 ...
Gupta, Meenu (2010-02-01). "A new strategy for the protection of intellectual property". Computer Fraud & Security. 2010 (2): 8 ... Establishing Information security requirements. Conduct IP protection and secrecy awareness training to all required person. ... The elements that could put into the program include the statement of security responsibilities for vendors, the right to ... examples is the series of ongoing lawsuits between Apple and Samsung regarding the design of smartphones and tablet computers. ...
"Hide and Seek: An Introduction to Steganography" (PDF). IEEE Security & Privacy. IEEE Computer Society. 1 (3): 32-44. doi: ... Transactions on Data Hiding and Multimedia Security III. Lecture Notes in Computer Science. Springer Berlin Heidelberg. 4920: 1 ... This additional security feature usually is achieved by: using a different initialization vector for each carrier and storing ... "Defending against statistical steganalysis". Proceedings of the 10th conference on USENIX Security Symposium. SSYM'01. USENIX ...
Security, Institute for Science and International. "Institute for Science and International Security". isis-online.org.. ... Three-dimensional images of tracer concentration within the body are then constructed by computer analysis. In modern PET ... Journal of Computer Assisted Tomography. 3 (6): 804-814. doi:10.1097/00004728-197903060-00018. ISSN 0363-8715. PMID 315970.. ... as well as requiring correspondingly greater computer resources. The advent of sub-nanosecond timing resolution detectors ...