Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Computer security

Known as: Computer security and identity theft, Compsec, Cyber security expert 
Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2009
Review
2009
The damage due to computer security incidents is motivating organizations to adopt protective mechanisms. While technological… Expand
  • figure 1
  • table 1
  • table 3
  • table 2
  • table 4
Review
2008
Review
2008
In this paper, we give an overview of the BitBlaze project, a new approach to computer security via binary analysis. In… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Highly Cited
2004
Highly Cited
2004
Most computers today are insecure because security is costly in terms of user inconvenience and foregone features, and people are… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
2003
Highly Cited
2003
  • M. Bishop
  • IEEE Secur. Priv.
  • 2003
  • Corpus ID: 2017999
Computer and network security, or cybersecurity, are critical issues. But merely protecting the systems that hold data about… Expand
Highly Cited
2002
Highly Cited
2002
Highly Cited
1998
Highly Cited
1998
Much of the computer security information regularly gathered and disseminated by individuals and organizations cannot currently… Expand
  • figure 4.1
  • figure 5.1
  • figure 5.2
  • figure 5.3
  • figure 5.4
Review
1994
Review
1994
An organized record of actual flaws can be useful to computer system designers, programmers, analysts, administrators, and users… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
1994
Highly Cited
1994
Threats to computer systems threat trees categorization of attacks Trojan horses and viruses common attack methods security… Expand
Highly Cited
1987
Highly Cited
1987
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed… Expand
  • figure 1
Highly Cited
1972
Highly Cited
1972
Approved for pubJic reJease; distribution unri mited. When U.S. Government drawings, specifications or other data are used for… Expand
  • figure 7-1
  • figure IV