Skip to search formSkip to main contentSkip to account menu

Computer security

Known as: Computer security and identity theft, Compsec, Cyber security expert 
Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
An important challenge for supporting multimedia applications in the Internet of Things is the security heterogeneity of wired… 
Highly Cited
2011
Highly Cited
2011
This article, by analyzing the damage on the communication network caused by the Wenchuan Earthquake, and the priorities of the… 
Highly Cited
2011
Highly Cited
2011
Recent cases of hedge fund fraud have caused large losses for investors and have fueled the debate regarding the ability of… 
Highly Cited
2009
Highly Cited
2006
Highly Cited
2006
Multihop wireless mesh networks (WMNs) are finding ever-growing acceptance as a viable and effective solution to ubiquitous… 
Highly Cited
2006
Highly Cited
2006
Attacks on AES.- Cache Attacks and Countermeasures: The Case of AES.- Related-Key Impossible Differential Attacks on 8-Round AES… 
Highly Cited
2004
Highly Cited
2004
Wireless network is susceptible to security attacks because its openness of transmission media. Wireless network security is… 
Highly Cited
2003
Highly Cited
2003
In this paper, the security of a modified remote user authentication scheme proposed by Shen, Lin, and Hwang is analyzed. We show… 
Highly Cited
2002
Highly Cited
2002
How to ensure the participation of mobile users (no matter how disruptive the circumstances), especially for mobile commerce…