Skip to search formSkip to main contentSkip to account menu

Computer security

Known as: Computer security and identity theft, Compsec, Cyber security expert 
Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Abstract : In some ways, the cyber domain is quite different from the traditional operational domains of air, land, sea, and… 
Highly Cited
2012
Highly Cited
2012
In this paper we discuss security procedures for constrained IoT devices. We start with the description of a general security… 
Highly Cited
2010
Highly Cited
2010
This paper discusses the use of a communications network security device, called a trust system, to enhance supervisory control… 
Highly Cited
2009
Highly Cited
2009
Traditional online security assessment determines whether the system is secure or not, but how secure or insecure is not… 
Highly Cited
2005
Highly Cited
2005
  • A. CreeryE. Byres
  • 2005
  • Corpus ID: 18922785
Many automation and modernization programs are now employing Intranet/Internet technologies in industrial control strategies. The… 
Highly Cited
2005
Highly Cited
2005
The amount of wind power constantly increased during recent years requiring detailed analysis about the impact of wind power on… 
Highly Cited
2004
Highly Cited
2004
The first generation of cellular mobile communications systems contained few if any security measures to protect the system… 
Highly Cited
2003
Highly Cited
2003
In this paper, the security of a modified remote user authentication scheme proposed by Shen, Lin, and Hwang is analyzed. We show… 
Highly Cited
2000
Highly Cited
2000
We study the problem of auditing databases which support statistical sum queries to protect the security of sensitive information…