Results 211 to 220 of about 94,728 (248)
Some of the next articles are maybe not open access.
One Giant Leap for Computer Security
IEEE Security and Privacy, 2020Today's computer systems trace their roots to an era of trusted users and highly constrained hardware; thus, their designs fundamentally emphasize performance and discount security.
Hamed Okhravi +6 more
semanticscholar +1 more source
Textbook Underflow: Insufficient Security Discussions in Textbooks Used for Computer Systems Courses
Technical Symposium on Computer Science Education, 2021Introductory computer science courses, such as Computer Systems, could be used to provide the first exposure to computer security to students. However, prior work has shown that, in the US's top R1 universities, computer systems courses are not taught ...
Majed Almansoori +4 more
semanticscholar +1 more source
USENIX Security Symposium
Researchers are increasingly exploring how gender, culture, and other sociodemographic factors correlate with user computer security and privacy behaviors.
Miranda Wei +5 more
semanticscholar +1 more source
Researchers are increasingly exploring how gender, culture, and other sociodemographic factors correlate with user computer security and privacy behaviors.
Miranda Wei +5 more
semanticscholar +1 more source
Using Automated Prompts for Student Reflection on Computer Security Concepts
Annual Conference on Innovation and Technology in Computer Science Education, 2019Reflection is known to be an effective means to improve students' learning. In this paper, we aim to foster meaningful reflection via prompts in computer science courses with a significant practical, software development component. To this end we develop
Hui Chen +2 more
semanticscholar +1 more source
International Conference on Cyber Security And Protection Of Digital Services, 2019
This study aims to identify the factors related to developing a cybersecurity culture at an organizational context and the difficulties faced in communicating and cooperating within a CSIRT.
M. Ioannou, Eliana Stavrou, Maria Bada
semanticscholar +1 more source
This study aims to identify the factors related to developing a cybersecurity culture at an organizational context and the difficulties faced in communicating and cooperating within a CSIRT.
M. Ioannou, Eliana Stavrou, Maria Bada
semanticscholar +1 more source
International Symposium on Computer Architecture, 2018
In the 1980s, Mead and Conway1 democratized chip design and high-level language programming surpassed assembly language programming, which made instruction set advances viable.
J. Hennessy
semanticscholar +1 more source
In the 1980s, Mead and Conway1 democratized chip design and high-level language programming surpassed assembly language programming, which made instruction set advances viable.
J. Hennessy
semanticscholar +1 more source
Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin
Information Security and Cryptography, 2021P. V. Oorschot
semanticscholar +1 more source
Climate change impacts on plant pathogens, food security and paths forward
Nature Reviews Microbiology, 2023Brajesh K Singh +2 more
exaly
The rumen microbiome: balancing food security and environmental impacts
Nature Reviews Microbiology, 2021Itzhak Mizrahi, Robert Wallace
exaly
Habituation effects in computer security warning
Information Security Journal, 2018Ammar Amran, Z. Zaaba, M. Singh
semanticscholar +1 more source

