Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
20
search results - page 2 / 4
»
Cybersecurity
Sort
relevance
views
votes
recent
update
View
thumb
title
115
Voted
CSREASAM
2010
186
views
Security Privacy
»
more
CSREASAM 2010
»
Keyloggers in Cybersecurity Education
15 years 4 days ago
Download
www.christopher-wood.com
Abstract-- Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, o...
Christopher Wood, Rajendra Raj
claim paper
Read More »
70
Voted
ICSE
2003
IEEE-ACM
102
views
Software Engineering
»
more
ICSE 2003
»
Cybersecurity
16 years 2 months ago
Download
www.verisign.com
Richard A. Kemmerer
claim paper
Read More »
73
Voted
COMPUTER
2008
75
views
more
COMPUTER 2008
»
Cybersecurity Strategies: The QuERIES Methodology
15 years 2 months ago
Download
www.ists.dartmouth.edu
Lawrence Carin, George Cybenko, Jeff Hughes
claim paper
Read More »
90
Voted
INTERNET
2010
124
views
more
INTERNET 2010
»
Metrics for Mitigating Cybersecurity Threats to Networks
15 years 1 months ago
Download
www.sis.pitt.edu
Norman F. Schneidewind
claim paper
Read More »
75
Voted
CACM
2011
122
views
more
CACM 2011
»
The ephemeral legion: producing an expert cyber-security work force from thin air
14 years 9 months ago
Download
csis.gmu.edu
Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia,...
claim paper
Read More »
« Prev
« First
page 2 / 4
Last »
Next »