Communications of the ACM
Computer ethics—part of computer science!
ACM SIGCAS Computers and Society
Enabling trusted software integrity
Proceedings of the 10th international conference on Architectural support for programming languages and operating systems
A Hardware-Software Platform for Intrusion Prevention
Proceedings of the 37th annual IEEE/ACM International Symposium on Microarchitecture
Password security: an empirical study
Journal of Management Information Systems
Do strong web passwords accomplish anything?
HOTSEC'07 Proceedings of the 2nd USENIX workshop on Hot topics in security
Computer viruses as artificial life
Artificial Life
Optimizing password composition policies
Proceedings of the fourteenth ACM conference on Electronic commerce
Proceedings of the 2013 ACM workshop on Artificial intelligence and security
Hi-index | 48.22 |
The following report has been gleaned from "A Tour of the Worm," an in-depth account of the November Internet infection. The author found the worm's crypt algorithm a frustrating, yet engaging, puzzle.