Results 211 to 220 of about 94,728 (248)
Some of the next articles are maybe not open access.

One Giant Leap for Computer Security

IEEE Security and Privacy, 2020
Today's computer systems trace their roots to an era of trusted users and highly constrained hardware; thus, their designs fundamentally emphasize performance and discount security.
Hamed Okhravi   +6 more
semanticscholar   +1 more source

Textbook Underflow: Insufficient Security Discussions in Textbooks Used for Computer Systems Courses

Technical Symposium on Computer Science Education, 2021
Introductory computer science courses, such as Computer Systems, could be used to provide the first exposure to computer security to students. However, prior work has shown that, in the US's top R1 universities, computer systems courses are not taught ...
Majed Almansoori   +4 more
semanticscholar   +1 more source

SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors

USENIX Security Symposium
Researchers are increasingly exploring how gender, culture, and other sociodemographic factors correlate with user computer security and privacy behaviors.
Miranda Wei   +5 more
semanticscholar   +1 more source

Using Automated Prompts for Student Reflection on Computer Security Concepts

Annual Conference on Innovation and Technology in Computer Science Education, 2019
Reflection is known to be an effective means to improve students' learning. In this paper, we aim to foster meaningful reflection via prompts in computer science courses with a significant practical, software development component. To this end we develop
Hui Chen   +2 more
semanticscholar   +1 more source

Cybersecurity Culture in Computer Security Incident Response Teams: Investigating difficulties in communication and coordination

International Conference on Cyber Security And Protection Of Digital Services, 2019
This study aims to identify the factors related to developing a cybersecurity culture at an organizational context and the difficulties faced in communicating and cooperating within a CSIRT.
M. Ioannou, Eliana Stavrou, Maria Bada
semanticscholar   +1 more source

A new golden age for computer architecture: Domain-specific hardware/software co-design, enhanced security, open instruction sets, and agile chip development

International Symposium on Computer Architecture, 2018
In the 1980s, Mead and Conway1 democratized chip design and high-level language programming surpassed assembly language programming, which made instruction set advances viable.
J. Hennessy
semanticscholar   +1 more source

Climate change impacts on plant pathogens, food security and paths forward

Nature Reviews Microbiology, 2023
Brajesh K Singh   +2 more
exaly  

The rumen microbiome: balancing food security and environmental impacts

Nature Reviews Microbiology, 2021
Itzhak Mizrahi, Robert Wallace
exaly  

Habituation effects in computer security warning

Information Security Journal, 2018
Ammar Amran, Z. Zaaba, M. Singh
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy