Sciweavers

20 search results - page 2 / 4
» Cybersecurity
Sort
View
CSREASAM
2010
15 years 2 months ago
Keyloggers in Cybersecurity Education
Abstract-- Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, o...
Christopher Wood, Rajendra Raj
ICSE
2003
IEEE-ACM
16 years 5 months ago
Cybersecurity
Richard A. Kemmerer
COMPUTER
2008
75views more  COMPUTER 2008»
15 years 5 months ago
Cybersecurity Strategies: The QuERIES Methodology
Lawrence Carin, George Cybenko, Jeff Hughes
INTERNET
2010
124views more  INTERNET 2010»
15 years 3 months ago
Metrics for Mitigating Cybersecurity Threats to Networks
Norman F. Schneidewind
99
Voted
CACM
2011
122views more  CACM 2011»
15 years 6 hour ago
The ephemeral legion: producing an expert cyber-security work force from thin air
Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia,...