Illustrative risks to the public in the use of computer systems and related technology
ACM SIGSOFT Software Engineering Notes
Communications of the ACM
Communications of the ACM
Enumerating the risks of reengineered processes
CSC '96 Proceedings of the 1996 ACM 24th annual conference on Computer science
Computer ethics and social issues case analysis: an environmental algorithm
ACM SIGCSE Bulletin
What happens when a medical office information system fails
ACM SIGCAS Computers and Society
Inside risks: a risks-related bookshelf
Communications of the ACM
Issues arising from medical system's failure
ACM SIGSOFT Software Engineering Notes
Content + experiences = curriculum
SIGCSE '97 Proceedings of the twenty-eighth SIGCSE technical symposium on Computer science education
Resources for teaching computer networks
SIGCSE '98 Proceedings of the twenty-ninth SIGCSE technical symposium on Computer science education
Liability for autonomous agent design
AGENTS '98 Proceedings of the second international conference on Autonomous agents
ACSE '98 Proceedings of the 3rd Australasian conference on Computer science education
Looking into safety with the safety and security Rapporteur group
Proceedings of the 1998 annual ACM SIGAda international conference on Ada
An ASIS-based static analysis tool for high-integrity systems
Proceedings of the 1998 annual ACM SIGAda international conference on Ada
Ethical issues related to internet development and research
ACM SIGCUE Outlook - Special issue on the working group reports of the 3rd annual SIGCSE/SIGCUE ITiCSE conference
The ethics of safety-critical systems
Communications of the ACM
Cryptographic Verification of Test Coverage Claims
IEEE Transactions on Software Engineering
Software engineering for safety: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Ethical issues related to internet development and research
ITiCSE-WGR '98 Working Group reports of the 3rd annual SIGCSE/SIGCUE ITiCSE conference on Integrating technology into computer science education
ICIS '00 Proceedings of the twenty first international conference on Information systems
Inside Risks: Inside “Inside Risks”
Communications of the ACM
Fifth California software symposium
ACM SIGSOFT Software Engineering Notes
Journal on Educational Resources in Computing (JERIC)
Beyond calculation
Proceedings of the 2002 ACM symposium on Applied computing
Safety critical systems: challenges and directions
Proceedings of the 24th International Conference on Software Engineering
Annals of Software Engineering
Liability for Autonomous Agent Design
Autonomous Agents and Multi-Agent Systems
IEEE Internet Computing
A Critical Look at Quality in Large-Scale Simulations
Computing in Science and Engineering
Java Security: Present and Near Future
IEEE Micro
N-Version Design Versus One Good Version
IEEE Software
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
Surfacing Root Requirements Interactions from Inquiry Cycle Requirements Documents
ICRE '98 Proceedings of the 3rd International Conference on Requirements Engineering: Putting Requirements Engineering to Practice
Software Construction and Analysis Tools for Future Space Missions
TACAS '02 Proceedings of the 8th International Conference on Tools and Algorithms for the Construction and Analysis of Systems
Analysis of Incidents Involving Interactive Systems
SAFECOMP '01 Proceedings of the 20th International Conference on Computer Safety, Reliability and Security
Analyzing Human-Machine Interactions in Safety-Critical Systems: A Basic Applicable Approach
SAFECOMP '01 Proceedings of the 20th International Conference on Computer Safety, Reliability and Security
Introduction to Computer Security
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
A social perspective on information security: theoretically grounding the domain
Socio-technical and human cognition elements of information systems
Programming methodology
Human values, ethics, and design
The human-computer interaction handbook
Assessing the risks of IT-enabled jobs
Managing the human side of information technology
Requirements interaction management
ACM Computing Surveys (CSUR)
Using cases to increase interest in ICT and computing as a career
CRPIT '03 Proceedings of the 3.1 and 3.3 working groups conference on International federation for information processing: ICT and the teacher of the future - Volume 23
A conceptual model for increasing utilization of dependable computer networks
Data & Knowledge Engineering
Analysis of security vulnerabilities in the movie production and distribution process
Proceedings of the 3rd ACM workshop on Digital rights management
Why software writing is difficult and will remain so
Information Processing Letters - Special issue: Contribution to computing science
Digital government
PocketLens: Toward a personal recommender system
ACM Transactions on Information Systems (TOIS)
Everything the universe, and life
IBM Systems Journal
Dealing with ghosts: Managing the user experience of autonomic computing
IBM Systems Journal
Agents of responsibility in software vulnerability processes
Ethics and Information Technology
Looking to the Internet for models of governance
Ethics and Information Technology
Using agile development methods to improve student writing
Journal of Computing Sciences in Colleges
(Awarded Best Theory Paper!) A Probabilistic Approach to Estimating Computer System Reliability
LISA '01 Proceedings of the 15th USENIX conference on System administration
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
Software product proposals in a computer science course for non-majors
Journal of Computing Sciences in Colleges
Encyclopedia of Computer Science
Encyclopedia of Computer Science
ACM SIGSOFT Software Engineering Notes
The risks of large organizations in developing complex systems
ACM SIGSOFT Software Engineering Notes
Teaching quality object-oriented programming
Journal on Educational Resources in Computing (JERIC)
Fractal: a mobile code-based framework for dynamic application protocol adaptation
Journal of Parallel and Distributed Computing - 19th International parallel and distributed processing symposium
System and network trustworthiness in perspective
Proceedings of the 13th ACM conference on Computer and communications security
A qualitative analysis of an "ethical election project" in an ethics class
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Performing real-time threat assessment of security incidents using data fusion of IDS logs
Journal of Computer Security
Enforcing well-formed and partially-formed transactions for Unix
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
The Strangest Thing About Software
Computer
WWW electronic commerce and java trojan horses
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
USITS'97 Proceedings of the USENIX Symposium on Internet Technologies and Systems on USENIX Symposium on Internet Technologies and Systems
Failures in complex systems: case studies, causes, and possible remedies
ACM SIGCSE Bulletin
Debugging debugged, a metaphysical manifesto of systems integration
ACM SIGSOFT Software Engineering Notes
The benefits and challenges of executable acceptance testing
Proceedings of the 2008 international workshop on Scrutinizing agile practices or shoot-out at the agile corral
ACM Transactions on Internet Technology (TOIT)
Information Systems Security
Optimizing Threshold Protocols in Adversarial Structures
DISC '08 Proceedings of the 22nd international symposium on Distributed Computing
Intelligibility and accountability: human considerations in context-aware systems
Human-Computer Interaction
SSS'06 Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems
Stabilizing trust and reputation for self-stabilizing efficient hosts in spite of Byzantine guests
SSS'07 Proceedings of the 9h international conference on Stabilization, safety, and security of distributed systems
Stabilizing trust and reputation for self-stabilizing efficient hosts in spite of byzantine guests
ACM SIGOPS Operating Systems Review
Causality analysis in contract violation
RV'10 Proceedings of the First international conference on Runtime verification
About theory in software development
GAVTASC'11 Proceedings of the 11th WSEAS international conference on Signal processing, computational geometry and artificial vision, and Proceedings of the 11th WSEAS international conference on Systems theory and scientific computation
A systematic approach to developing safe tele-operated robots
Ada-Europe'06 Proceedings of the 11th Ada-Europe international conference on Reliable Software Technologies
Ideal based cyber security technical metrics for control systems
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
IFM'05 Proceedings of the 5th international conference on Integrated Formal Methods
SP 800-12. An Introduction to Computer Security: the NIST Handbook
SP 800-12. An Introduction to Computer Security: the NIST Handbook
What will it take? A view on adoption of model-based methods in practice
Software and Systems Modeling (SoSyM)
Comparative language fuzz testing: programming languages vs. fat fingers
Proceedings of the ACM 4th annual workshop on Evaluation and usability of programming languages and tools
The Ethics of Cyberweapons in Warfare
International Journal of Technoethics
Normal accidents: Data quality problems in ERP-enabled manufacturing
Journal of Data and Information Quality (JDIQ)
Computer Engineering 2004: Curriculum Guidelines for Undergraduate Degree Programs in Computer Engineering
Assessing the quality of large-scale data standards: A case of XBRL GAAP Taxonomy
Decision Support Systems
Hi-index | 0.08 |