Results 251 to 260 of about 5,949,154 (313)
Some of the next articles are maybe not open access.
2022
Instructions. Submit your solution electronically via your class account by Monday Apr 29, at 10:00PM. You should upload a single file, HW4.pdf. Your writeup should include your name, your class account name (e.g., cs161-xy), your TA's name, your ...
Wenliang Du
openaire +3 more sources
Instructions. Submit your solution electronically via your class account by Monday Apr 29, at 10:00PM. You should upload a single file, HW4.pdf. Your writeup should include your name, your class account name (e.g., cs161-xy), your TA's name, your ...
Wenliang Du
openaire +3 more sources
arXiv.org, 2023
In this paper, we introduce SecQA, a novel dataset tailored for evaluating the performance of Large Language Models (LLMs) in the domain of computer security.
Zefang Liu
semanticscholar +1 more source
In this paper, we introduce SecQA, a novel dataset tailored for evaluating the performance of Large Language Models (LLMs) in the domain of computer security.
Zefang Liu
semanticscholar +1 more source
Deception Techniques in Computer Security
ACM Computing Surveys, 2018A recent trend both in academia and industry is to explore the use of deception techniques to achieve proactive attack detection and defense—to the point of marketing intrusion deception solutions as zero-false-positive intrusion detection.
Xiao Han, Nizar Kheir, D. Balzarotti
semanticscholar +1 more source
Asleep at the Keyboard? Assessing the Security of GitHub Copilot’s Code Contributions
IEEE Symposium on Security and Privacy, 2021There is burgeoning interest in designing AI-based systems to assist humans in designing computing systems, including tools that automatically generate computer code.
H. Pearce +4 more
semanticscholar +1 more source
IEEE Security & Privacy Magazine, 2004
Computer security has hit the mainstream. This paper is a high-level treatment of computer security, its concepts and terminology, and some pointers about where to go for more information.
Almushilah, Mohammed +2 more
openaire +2 more sources
Computer security has hit the mainstream. This paper is a high-level treatment of computer security, its concepts and terminology, and some pointers about where to go for more information.
Almushilah, Mohammed +2 more
openaire +2 more sources
Journal of AHIMA, 1993
Many factors are contributing to any increased awareness of and interest in computer security. This article has described two aspects of computer security, identification of users and cryptography as a tool for data security. We looked at a number of ways to verify the identity of a user, including things a person knows, has, or is.
L L, Wear, J R, Pinkert
openaire +3 more sources
Many factors are contributing to any increased awareness of and interest in computer security. This article has described two aspects of computer security, identification of users and cryptography as a tool for data security. We looked at a number of ways to verify the identity of a user, including things a person knows, has, or is.
L L, Wear, J R, Pinkert
openaire +3 more sources

