Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
20
search results - page 2 / 4
»
Cybersecurity
Sort
relevance
views
votes
recent
update
View
thumb
title
18
click to vote
CSREASAM
2010
186
views
Security Privacy
»
more
CSREASAM 2010
»
Keyloggers in Cybersecurity Education
13 years 2 months ago
Download
www.christopher-wood.com
Abstract-- Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, o...
Christopher Wood, Rajendra Raj
claim paper
Read More »
8
click to vote
ICSE
2003
IEEE-ACM
102
views
Software Engineering
»
more
ICSE 2003
»
Cybersecurity
14 years 5 months ago
Download
www.verisign.com
Richard A. Kemmerer
claim paper
Read More »
7
click to vote
COMPUTER
2008
75
views
more
COMPUTER 2008
»
Cybersecurity Strategies: The QuERIES Methodology
13 years 5 months ago
Download
www.ists.dartmouth.edu
Lawrence Carin, George Cybenko, Jeff Hughes
claim paper
Read More »
15
click to vote
INTERNET
2010
124
views
more
INTERNET 2010
»
Metrics for Mitigating Cybersecurity Threats to Networks
13 years 3 months ago
Download
www.sis.pitt.edu
Norman F. Schneidewind
claim paper
Read More »
11
click to vote
CACM
2011
122
views
more
CACM 2011
»
The ephemeral legion: producing an expert cyber-security work force from thin air
13 years 4 days ago
Download
csis.gmu.edu
Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia,...
claim paper
Read More »
« Prev
« First
page 2 / 4
Last »
Next »