Computer security

Known as: Computer security and identity theft, Compsec, Cyber security expert 
Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
For various reasons, the cloud computing paradigm is unable to meet certain requirements (e.g. low latency and jitter, context… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • table 3
Is this relevant?
Highly Cited
2012
Highly Cited
2012
The recent emergence of Cloud Computing has drastically altered everyone’s perception of infrastructure architectures, software… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Available online 21 November 2008 
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
If you get the printed book in on-line book store, you may also find the same problem. So, you must move store to store and… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
I intend to keep a collection of links at the book’s web page, http://www.rossanderson.com. Please check out this page if a link… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
State-of-the-art and emerging scientific applications require fast access to large quantities of data and commensurately fast… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Much of the computer security information regularly gathered and disseminated by individuals and organizations cannot currently… (More)
  • figure 4.1
  • figure 5.1
  • figure 5.2
  • figure 5.3
  • figure 5.4
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Diversity is an important source of robustness in biological systems. Computers, by contrast, are notable for their lack of… (More)
Is this relevant?
Highly Cited
1987
Highly Cited
1987
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed… (More)
  • figure 1
Is this relevant?
Highly Cited
1972
Highly Cited
1972
Approved for pubJic reJease; distribution unri mited. When U.S. Government drawings, specifications or other data are used for… (More)
Is this relevant?