Sciweavers

20 search results - page 2 / 4
» Cybersecurity
Sort
View
115
Voted
CSREASAM
2010
15 years 4 days ago
Keyloggers in Cybersecurity Education
Abstract-- Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, o...
Christopher Wood, Rajendra Raj
70
Voted
ICSE
2003
IEEE-ACM
16 years 2 months ago
Cybersecurity
Richard A. Kemmerer
73
Voted
COMPUTER
2008
75views more  COMPUTER 2008»
15 years 2 months ago
Cybersecurity Strategies: The QuERIES Methodology
Lawrence Carin, George Cybenko, Jeff Hughes
90
Voted
INTERNET
2010
124views more  INTERNET 2010»
15 years 1 months ago
Metrics for Mitigating Cybersecurity Threats to Networks
Norman F. Schneidewind
75
Voted
CACM
2011
122views more  CACM 2011»
14 years 9 months ago
The ephemeral legion: producing an expert cyber-security work force from thin air
Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia,...