Skip to search formSkip to main contentSkip to account menu

Computer security

Known as: Computer security and identity theft, Compsec, Cyber security expert 
Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Design of Vehicular monitoring and tracking system based on ARM using GSM and GPM is proposed. The vehicular module is used to… 
Highly Cited
2007
Highly Cited
2007
Given a set of model graphs D and a query graph q, containment search aims to find all model graphs g e D such that q contains g… 
Review
2006
Review
2006
intrusion detection systems is one of the most active fields of research in Mobile Ad-hoc Network’s (MANET) field. This systems… 
2005
2005
  • 2005
  • Corpus ID: 10331725
Highly Cited
2004
Highly Cited
2004
The relevance and pervasiveness of Web applications as a vital part of modern enterprise systems has significantly increased in… 
2004
2004
We propose a novel framework named Hidden Colored Petri-Net for Alert Correlation and Understanding (HCPN-ACU) in intrusion… 
Highly Cited
2004
Highly Cited
2004
  • G. RobertsJ. Pick
  • 2004
  • Corpus ID: 12542930
This paper studies the technology factors that companies consider important in deciding to adopt and deploy wireless devices… 
2004
2004
This document presents objectives for an interoperable protocol for the Control and Provisioning of Wireless Access Points… 
2004
2004
In the presence of attackers reliable and trustworthy operation of mobile ad hoc networks is impossible without secure routing… 
Highly Cited
1997
Highly Cited
1997
We show how to use cyclotomic polynomials to construct subgroups of multiplicative groups of finite fields that allow very…