Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,508,461 papers from all fields of science
Search
Sign In
Create Free Account
Computer security
Known as:
Computer security and identity theft
, Compsec
, Cyber security expert
Expand
Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Aircraft Communications Addressing and Reporting System
Anti-worm
Arbitrary code execution
Backup
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
SA-EAST
Keke Gai
,
Longfei Qiu
,
Min Chen
,
Hui Zhao
,
Meikang Qiu
ACM Transactions on Embedded Computing Systems
2017
Corpus ID: 207242049
The expected advanced network explorations and the growing demand for mobile data sharing and transferring have driven numerous…
Expand
Highly Cited
2011
Highly Cited
2011
Pico: No More Passwords!
F. Stajano
Security Protocols Workshop
2011
Corpus ID: 16190648
From a usability viewpoint, passwords and PINs have reached the end of their useful life. Even though they are convenient for…
Expand
Highly Cited
2009
Highly Cited
2009
Pattern Discovery of Web Usage Mining
Shah Nina
,
Mahmudur Rahman
,
Khairul Islam Bhuiyan
,
K. Ahmed
International Conference on Computer Technology…
2009
Corpus ID: 18430275
This paper provides a comprehensive idea about the pattern discovery of web usage mining. Web site designers should have clear…
Expand
Highly Cited
2009
Highly Cited
2009
On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining
Ian Molloy
,
Ninghui Li
,
Tiancheng Li
Ninth IEEE International Conference on Data…
2009
Corpus ID: 16963510
The recent interest in outsourcing IT services onto the cloud raises two main concerns: security and cost. One task that could be…
Expand
Highly Cited
2007
Highly Cited
2007
Towards Graph Containment Search and Indexing
Cheng Chen
,
Xifeng Yan
,
Philip S. Yu
,
Jiawei Han
,
Dong-Qing Zhang
,
Xiaohui Gu
Very Large Data Bases Conference
2007
Corpus ID: 1803605
Given a set of model graphs D and a query graph q, containment search aims to find all model graphs g e D such that q contains g…
Expand
Highly Cited
2005
Highly Cited
2005
The security of VANETs
M. Raya
,
J. Hubaux
International Workshop on VehiculAr Inter…
2005
Corpus ID: 6749562
In this work, we address the security of VANETs. We provide a detailed threat analysis and devise an appropriate security…
Expand
Review
2005
Review
2005
How should banks account for loan losses
G. Benston
,
L. Wall
2005
Corpus ID: 2673451
Highly Cited
2004
Highly Cited
2004
System impact study for the interconnection of wind generation and utility system
C. Chompoo-Inwai
,
Weijen Lee
,
P. Fuangfoo
,
M. Williams
,
J. Liao
Conference, IEEE Industrial and Commercial Power…
2004
Corpus ID: 62807905
Following in the steps of the gas industry, the traditional paradigm of the vertically integrated electric utility structure has…
Expand
Highly Cited
2004
Highly Cited
2004
A steganographic scheme for secure communications based on the chaos and euler Theorem
D. Lou
,
Chia-Hung Sung
IEEE transactions on multimedia
2004
Corpus ID: 12770859
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence…
Expand
Highly Cited
2003
Highly Cited
2003
Cryptanalysis of a modified remote user authentication scheme using smart cards
K. Leung
,
Lee-Ming Cheng
,
A. Fong
,
Chi-Kwong Chan
IEEE Trans. Consumer Electron.
2003
Corpus ID: 206631417
In this paper, the security of a modified remote user authentication scheme proposed by Shen, Lin, and Hwang is analyzed. We show…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE