Parallel program design: a foundation
Parallel program design: a foundation
Optimal comparison strategies in Ulam's searching game with two errors
Theoretical Computer Science
Information warfare and security
Information warfare and security
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
Journal of the American Society for Information Science and Technology - Special issue on the still the frontier: Information Science at the Millenium
Trust Relationships in Secure Systems-A Distributed Authentication Perspective
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Can pseudonymity really guarantee privacy?
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
An ethics and security course for students in computer science and information technology
Proceedings of the 37th SIGCSE technical symposium on Computer science education
HSI'09 Proceedings of the 2nd conference on Human System Interactions
HSI'09 Proceedings of the 2nd conference on Human System Interactions
Semantic hacking and intelligence and security informatics
ISI'03 Proceedings of the 1st NSF/NIJ conference on Intelligence and security informatics
How to Track Absolutely Everything
Proceedings of the 2010 conference on Ontologies and Semantic Technologies for Intelligence
Security issues for pervasive personalized communication systems
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Hi-index | 4.10 |
On 25 August 2000, stockholders were stunned by news that server and storage provider Emulex was revising its earnings from a per-share gain to a loss, while lowering its reported net earnings from the previous quarter as well. Within minutes, Emulex shares plummeted. Yet none of this news fostered by a hacker's bogus press release was true.The Emulex case illustrates the speed, scale, and subtlety with which networked information can propagate and how quickly severe consequences can occur. This rapid dissemination, which makes such cognitive hacking possible, is forcing security researchers to look at yet another class of countermeasures a class far different from solutions that seek to secure technology and network infrastructure.