Skip to search formSkip to main contentSkip to account menu

Computer security

Known as: Computer security and identity theft, Compsec, Cyber security expert 
Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Design of Vehicular monitoring and tracking system based on ARM using GSM and GPM is proposed. The vehicular module is used to… 
2012
2012
Cloud computing is one of the most discussed topics today in the field of information technology. It introduces a new Internet… 
Review
2012
Review
2012
The new developments in the field of information technology offered the people enjoyment, comforts and convenience. Cloud… 
Review
2006
Review
2006
intrusion detection systems is one of the most active fields of research in Mobile Ad-hoc Network’s (MANET) field. This systems… 
2005
2005
  • 2005
  • Corpus ID: 10331725
Highly Cited
2004
Highly Cited
2004
  • G. RobertsJ. Pick
  • 2004
  • Corpus ID: 12542930
This paper studies the technology factors that companies consider important in deciding to adopt and deploy wireless devices… 
2004
2004
We propose a novel framework named Hidden Colored Petri-Net for Alert Correlation and Understanding (HCPN-ACU) in intrusion… 
2004
2004
This document presents objectives for an interoperable protocol for the Control and Provisioning of Wireless Access Points… 
2004
2004
In the presence of attackers reliable and trustworthy operation of mobile ad hoc networks is impossible without secure routing… 
Highly Cited
1997
Highly Cited
1997
We show how to use cyclotomic polynomials to construct subgroups of multiplicative groups of finite fields that allow very…