Skip to search formSkip to main contentSkip to account menu

Computer security

Known as: Computer security and identity theft, Compsec, Cyber security expert 
Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
The expected advanced network explorations and the growing demand for mobile data sharing and transferring have driven numerous… 
Highly Cited
2011
Highly Cited
2011
  • F. Stajano
  • 2011
  • Corpus ID: 16190648
From a usability viewpoint, passwords and PINs have reached the end of their useful life. Even though they are convenient for… 
Highly Cited
2009
Highly Cited
2009
This paper provides a comprehensive idea about the pattern discovery of web usage mining. Web site designers should have clear… 
Highly Cited
2009
Highly Cited
2009
The recent interest in outsourcing IT services onto the cloud raises two main concerns: security and cost. One task that could be… 
Highly Cited
2007
Highly Cited
2007
Given a set of model graphs D and a query graph q, containment search aims to find all model graphs g e D such that q contains g… 
Highly Cited
2005
Highly Cited
2005
In this work, we address the security of VANETs. We provide a detailed threat analysis and devise an appropriate security… 
Review
2005
Highly Cited
2004
Highly Cited
2004
Following in the steps of the gas industry, the traditional paradigm of the vertically integrated electric utility structure has… 
Highly Cited
2004
Highly Cited
2004
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence… 
Highly Cited
2003
Highly Cited
2003
In this paper, the security of a modified remote user authentication scheme proposed by Shen, Lin, and Hwang is analyzed. We show…