By Topic

Computer

Issue 6 • Date June 2014

Filter Results

Displaying Results 1 - 25 of 28
  • [Front cover]

    Publication Year: 2014 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (1343 KB)  
    Freely Available from IEEE
  • Rock Stars of Cybersecurity [Advertisement]

    Publication Year: 2014 , Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (2886 KB)  
    Freely Available from IEEE
  • [Masthead]

    Publication Year: 2014 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (161 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014 , Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (807 KB)  
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2014 , Page(s): 4 - 5
    Save to Project icon | Request Permissions | PDF file iconPDF (849 KB)  
    Freely Available from IEEE
  • On-Time Warning Delivery for Vehicular Ad Hoc Networks

    Publication Year: 2014 , Page(s): 6
    Save to Project icon | Request Permissions | PDF file iconPDF (476 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Privacy and Big Data

    Publication Year: 2014 , Page(s): 7 - 9
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1140 KB) |  | HTML iconHTML  

    Big data's explosive growth has prompted the US government to release new reports that address the issues--particularly related to privacy--resulting from this growth. The Web extra at http://youtu.be/j49eoe5g8-c is an audio recording from the Computing and the Law column, in which authors Brian M. Gaff, Heather Egan Sussman, and Jennifer Geetter discuss how big data's explosive growth has prompte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago

    Publication Year: 2014 , Page(s): 10 - 11
    Save to Project icon | Request Permissions | PDF file iconPDF (748 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2014 , Page(s): 12 - 17
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2219 KB) |  | HTML iconHTML  

    Topics include ongoing problems caused by the Heartbleed Internet-security flaw, the end of another epic Apple-Samsung patent-related trial, an Internet Explorer bug threatening users of the world's most popular browser, new laser technology that could quadruple Internet-access speeds, Facebook working on drones and satellites to bring the Internet to remote areas, a US government report that says... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Letters

    Publication Year: 2014 , Page(s): 18 - 19
    Save to Project icon | Request Permissions | PDF file iconPDF (380 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • IEEE Security & Privacy [Advertisement]

    Publication Year: 2014 , Page(s): 20
    Save to Project icon | Request Permissions | PDF file iconPDF (1844 KB)  
    Freely Available from IEEE
  • Mobile Application Security

    Publication Year: 2014 , Page(s): 21 - 23
    Save to Project icon | Request Permissions | PDF file iconPDF (1080 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Thwarting Obfuscated Malware via Differential Fault Analysis

    Publication Year: 2014 , Page(s): 24 - 31
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1073 KB) |  | HTML iconHTML  

    Detecting malware in mobile applications has become increasingly complex as malware developers turn to advanced techniques to hide or obfuscate malicious components. Alterdroid is a dynamic-analysis tool that compares the behavioral differences between an original app and numerous automatically generated versions of it containing carefully injected modifications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RootGuard: Protecting Rooted Android Phones

    Publication Year: 2014 , Page(s): 32 - 40
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1089 KB) |  | HTML iconHTML  

    Though popular for achieving full operation functionality, rooting Android phones opens these devices to significant security threats. RootGuard offers protection from malware with root privileges while providing user flexibility and control. The Web extra at http://youtu.be/-KMMfxOoCjg is a video demonstration of how RootGuard manages root privileges of Android apps in a flexible and robust manne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Membership Matters [Advertisement]

    Publication Year: 2014 , Page(s): 41
    Save to Project icon | Request Permissions | PDF file iconPDF (654 KB)  
    Freely Available from IEEE
  • Smart AppStore: Expanding the Frontiers of Smartphone Ecosystems

    Publication Year: 2014 , Page(s): 42 - 47
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1820 KB) |  | HTML iconHTML  

    Smart AppStore offers five important features for today's smartphone users: biometric authentication, multilevel authorization, gesture recognition and navigation, user-tailored reputation scores, and identity management. The Web extra at http://youtu.be/15KPOUp5H_A is a video demonstration of Smart AppStore, which offers five important features for today's smartphone users: biometric authenticati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing the "Bring Your Own Device" Paradigm

    Publication Year: 2014 , Page(s): 48 - 56
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3778 KB) |  | HTML iconHTML  

    The current mobile application distribution model cannot cope with the complex security requirements of the emerging "bring your own device" (BYOD) paradigm. A secure metamarket architecture supports the definition and enforcement of BYOD policies and offers a promising prototype implementation tested under realistic conditions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security in the Firefox OS and Tizen Mobile Platforms

    Publication Year: 2014 , Page(s): 57 - 63
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1151 KB) |  | HTML iconHTML  

    Emerging mobile platforms Firefox OS and Tizen are learning from Android's security successes and trying to avoid its limitations. Although these platforms offer largely novel solutions, they can still learn from one another. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leadership Failures in the National Security Complex

    Publication Year: 2014 , Page(s): 64 - 67
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1174 KB) |  | HTML iconHTML  

    Current NSA forecast: continued Snowden flurries with no end in sight. No one blames the hardworking NSA employees for the latest series of gaffes; it's the feckless leadership and the politics that got them there that are responsible for our current difficulties. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Globalizing Modeling Languages

    Publication Year: 2014 , Page(s): 68 - 71
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1592 KB) |  | HTML iconHTML  

    In the software and systems modeling community, domain-specific modeling language (DSML) research is focused on providing technologies for developing languages and tools that allow domain experts to develop system solutions efficiently. Unfortunately, it's very difficult for software and systems engineers to reason about information spread across models describing different system aspects because ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Imagineering an Internet of Anything

    Publication Year: 2014 , Page(s): 72 - 77
    Cited by:  Papers (9)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3417 KB) |  | HTML iconHTML  

    Today, the Internet of Things. Tomorrow, the Internet of Everything. Beyond that, perhaps, the Internet of Anything--a radically super-connected ecosystem where questions about security, trust, and control assume entirely new dimensions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Working with Students Where Theory and Practice Intersect

    Publication Year: 2014 , Page(s): 78 - 80
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2056 KB) |  | HTML iconHTML  

    The Digital Future Lab enables University of Washington Bothell students to apply multiple interactive media skills in a wide range of endeavors--from creating a commercial transmedia game franchise to developing a simulation that raises awareness about bullying. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Information [Advertisement]

    Publication Year: 2014 , Page(s): 81
    Save to Project icon | Request Permissions | PDF file iconPDF (81 KB)  
    Freely Available from IEEE
  • The Future of Online Instruction, Part 2

    Publication Year: 2014 , Page(s): 82 - 84
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1597 KB) |  | HTML iconHTML  

    The current and popular model of e-learning is not so different from traditional lecture modes of instruction, with perhaps even more drawbacks than we care to acknowledge. Today's learning management systems (LMSs) have mainly to do with teaching and little to do with learning. Adaptive learning is in fact rooted in principles that have been around for a very long time, although they have gone by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Orchestrating Hybrid Cloud Deployment: An Overview

    Publication Year: 2014 , Page(s): 85 - 87
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1350 KB) |  | HTML iconHTML  

    Balancing enterprise control over cloud data with hybrid cloud benefits will increasingly require cloud orchestration. Reaping full hybrid cloud benefits requires increased organizational focus on security and control. But as more clouds come into play, each with specific offerings and rules, implementing these controls and coordinating management over different environments can become burdensome.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by professionals representing the full spectrum of computing technology from hardware to software and from current research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com