Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,791,891 papers from all fields of science
Search
Sign In
Create Free Account
Computer security
Known as:
Computer security and identity theft
, Compsec
, Cyber security expert
Expand
Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Aircraft Communications Addressing and Reporting System
Anti-worm
Arbitrary code execution
Backup
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
ARM Hardware Plaform for Vehicular Monitoring and Tracking
Saurabh Chakole
,
An Autonomous
,
+4 authors
Asst Y A Suryawanshi
International Conference on Communication Systems…
2013
Corpus ID: 15641803
Design of Vehicular monitoring and tracking system based on ARM using GSM and GPM is proposed. The vehicular module is used to…
Expand
2012
2012
A Framework for A Framework for A Framework for A Framework for SSSSeeeeccccure Cloud ure Cloud ure Cloud ure Cloud ComputingComputingComputingComputing
Ahmed E. Youssef
,
Manal Alageel
2012
Corpus ID: 94875
Cloud computing is one of the most discussed topics today in the field of information technology. It introduces a new Internet…
Expand
Review
2012
Review
2012
A review on cloud computing security issues & challanges
F. A. Alvi
,
B. Choudary
,
N. Jaferry
,
E. Pathan
2012
Corpus ID: 3872562
The new developments in the field of information technology offered the people enjoyment, comforts and convenience. Cloud…
Expand
Review
2006
Review
2006
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks-The routing problem
E. Caballero
2006
Corpus ID: 15139585
intrusion detection systems is one of the most active fields of research in Mobile Ad-hoc Network’s (MANET) field. This systems…
Expand
2005
2005
Hoc Networks
2005
Corpus ID: 10331725
Highly Cited
2004
Highly Cited
2004
Technology factors in corporate adoption of mobile cell phones: a case study analysis
G. Roberts
,
J. Pick
37th Annual Hawaii International Conference on…
2004
Corpus ID: 12542930
This paper studies the technology factors that companies consider important in deciding to adopt and deploy wireless devices…
Expand
2004
2004
A Novel Framework for Alert Correlation and Understanding
Dong Yu
,
D. Frincke
International Conference on Applied Cryptography…
2004
Corpus ID: 958372
We propose a novel framework named Hidden Colored Petri-Net for Alert Correlation and Understanding (HCPN-ACU) in intrusion…
Expand
2004
2004
Objectives for Control and Provisioning of Wireless Access Points (CAPWAP)
S. Govindan
,
Hong Cheng
,
Zhonghui Yao
,
Wenhui Zhou
,
Lily Yang
Request for Comments
2004
Corpus ID: 34422255
This document presents objectives for an interoperable protocol for the Control and Provisioning of Wireless Access Points…
Expand
2004
2004
Secure routing in a vehicular ad hoc network
Stephan Eichler
,
Florian Dotzert
,
Christian SchwingenschlOgl
,
F. Caro
,
Jorg Eberspacher
IEEE 60th Vehicular Technology Conference, . VTC…
2004
Corpus ID: 2265594
In the presence of attackers reliable and trustworthy operation of mobile ad hoc networks is impossible without secure routing…
Expand
Highly Cited
1997
Highly Cited
1997
Using Cyclotomic Polynomials to Construct Efficient Discrete Logarithm Cryptosystems Over Finite Fields
A. Lenstra
Australasian Conference on Information Security…
1997
Corpus ID: 39393535
We show how to use cyclotomic polynomials to construct subgroups of multiplicative groups of finite fields that allow very…
Expand