Sciweavers

20 search results - page 2 / 4
» Cybersecurity
Sort
View
116
Voted
CSREASAM
2010
15 years 8 days ago
Keyloggers in Cybersecurity Education
Abstract-- Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, o...
Christopher Wood, Rajendra Raj
71
Voted
ICSE
2003
IEEE-ACM
16 years 3 months ago
Cybersecurity
Richard A. Kemmerer
COMPUTER
2008
75views more  COMPUTER 2008»
15 years 3 months ago
Cybersecurity Strategies: The QuERIES Methodology
Lawrence Carin, George Cybenko, Jeff Hughes
CACM
2011
122views more  CACM 2011»
14 years 10 months ago
The ephemeral legion: producing an expert cyber-security work force from thin air
Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia,...