Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Computer security

Known as: Computer security and identity theft, Compsec, Cyber security expert 
Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted significant attention from the research… Expand
  • table I
  • figure 1
  • figure 2
  • table II
  • figure 3
Is this relevant?
Review
2019
Review
2019
This survey paper describes a literature review of deep learning (DL) methods for cyber security applications. A short tutorial… Expand
  • figure 2
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2019
Review
2019
Abstract The comprehensive integration of instrumentation, communication, and control into physical systems has led to the study… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2019
Review
2019
Smart grids (SGs), which can be classified into a class of networked distributed control systems, are designed to deliver… Expand
  • figure 1
  • table I
  • table II
  • figure 2
Is this relevant?
Review
2019
Review
2019
In the last century, the automotive industry has arguably transformed society, being one of the most complex, sophisticated, and… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 2
Is this relevant?
Review
2019
Review
2019
In recent years, artificial intelligence technologies have been widely used in computer vision, natural language processing… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • table 1
Is this relevant?
Review
2019
Review
2019
Abstract In the world scenario, concerns with security and privacy regarding computer networks are always increasing. Computer… Expand
Is this relevant?
Review
2019
Review
2019
Insider threats are one of today’s most challenging cybersecurity issues that are not well addressed by commonly employed… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1999
Highly Cited
1999
  • D. Gollmann
  • Worlwide series in computer cience
  • 1999
  • Corpus ID: 63801101
A completely up-to-date resource on computer securityAssuming no previous experience in the field of computer security, this must… Expand
Is this relevant?
Highly Cited
1972
Highly Cited
1972
Approved for pubJic reJease; distribution unri mited. When U.S. Government drawings, specifications or other data are used for… Expand
  • figure 7-1
  • figure IV
Is this relevant?