Notice
There is currently an issue with the citation download feature. Learn more

Computer

Issue 4 • Apr. 2015

Filter Results

Displaying Results 1 - 25 of 25
  • Front Cover

    Publication Year: 2015, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (3395 KB)
    Freely Available from IEEE
  • IEEE Security & Privacy [Advertisement]

    Publication Year: 2015, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (3454 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (2532 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2015, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2015, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (1557 KB)
    Freely Available from IEEE
  • Representation Learning

    Publication Year: 2015, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (528 KB)
    Freely Available from IEEE
  • Important IP Cases in 2015, Part One

    Publication Year: 2015, Page(s):7 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1090 KB) | HTML iconHTML

    Several intellectual property cases this year raise important patent, copyright, and trademark law issues-this month's column focuses on the patent cases. Part one in a two-part series. The Web extra at http://youtu.be/caRwpdYrGDE is an audio recording of Brian M. Gaff reading his Computing and the Law column, in which he discusses several 2015 intellectual property cases that raise important pate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago

    Publication Year: 2015, Page(s):10 - 11
    Request permission for commercial reuse | PDF file iconPDF (907 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cybersecurity: Toward a Secure and Sustainable Cyber Ecosystem

    Publication Year: 2015, Page(s):12 - 14
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (2142 KB) | HTML iconHTML
    Freely Available from IEEE
  • Get more, for less [Advertisement]

    Publication Year: 2015, Page(s): 15
    Request permission for commercial reuse | PDF file iconPDF (186 KB)
    Freely Available from IEEE
  • Rethinking Computers for Cybersecurity

    Publication Year: 2015, Page(s):16 - 25
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2727 KB) | HTML iconHTML

    Cyberattacks are growing at an alarming rate, even as our dependence on cyberspace transactions increases. Our software security solutions may no longer be sufficient. It is time to rethink computer design from the foundations. Can hardware security be enlisted to improve cybersecurity? The author discusses two classes of hardware security: hardware-enhanced security architectures for improving so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protecting Websites from Attack with Secure Delivery Networks

    Publication Year: 2015, Page(s):26 - 34
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2376 KB) | HTML iconHTML

    Secure delivery networks can help prevent or mitigate the most common attacks against mission-critical websites. A case study from a leading provider of content delivery services illustrates one such network's operation and effectiveness. The Web extra at https://youtu.be/4FRRI0aJLQM is an overview of the evolving threat landscape with Akamai Director of Web Security Solutions Product Marketing, D... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Denial and Deception in Cyber Defense

    Publication Year: 2015, Page(s):36 - 44
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1663 KB) | HTML iconHTML

    As attack techniques evolve, cybersystems must also evolve to provide the best continuous defense. Leveraging classical denial and deception techniques to understand the specifics of adversary attacks enables an organization to build an active, threat-based cyber defense. The Web extra at https://youtu.be/9g_HLNXiLto is a video that describes how in January 2012, MITRE performed a real-time, red t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing the Federal Cybersecurity R&D Strategy

    Publication Year: 2015, Page(s):45 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1828 KB) | HTML iconHTML

    In 2011, the US government asked for game-changing research that would fundamentally improve the security, safety, and trustworthiness of the national digital infrastructure. Agencies have responded with novel ideas, from moving target management to tailored trustworthy spaces. The Web extra at https://youtu.be/ZdUDIDolCM4 is a video of Vint Cerf introducing the Honorable Al Gore, 45th Vice Presid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling Smart Camera Networks with Smartphone Processors

    Publication Year: 2015, Page(s):56 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2134 KB) | HTML iconHTML

    Distributed smart cameras exploit smartphone processor performance in their node communication and video metadata exchange, allowing the network to collectively reason in interpreting the scene, generating alerts, and making decisions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introducing Combinatorial Testing in a Large Organization

    Publication Year: 2015, Page(s):64 - 72
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (753 KB) | HTML iconHTML

    A two-year study of eight pilot projects to introduce combinatorial testing in a large aerospace corporation found that the new methods were practical, significantly lowered development costs, and improved test coverage by 20 to 50 percent. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Information

    Publication Year: 2015, Page(s): 73
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • A Little Ingenuity Solves an Elephant-Sized Problem

    Publication Year: 2015, Page(s):74 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1747 KB) | HTML iconHTML

    A student team from NC State has designed a collar to help control wild elephants that threaten human property and life in Africa and Asia. The Web extra at https://youtu.be/aQV_BkOL4vA is a video showing how students from North Carolina State University designed a collar to keep elephants away from farms and villages. In this field test in South Africa, a buzzing sound from the collar causes an e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptographically Secure Computation

    Publication Year: 2015, Page(s):78 - 81
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1397 KB) | HTML iconHTML

    Researchers are making secure multiparty computation--a cryptographic technique that enables information sharing and analysis while keeping sensitive inputs secret--faster and easier to use for application software developers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Borderline Executive Disorder

    Publication Year: 2015, Page(s):82 - 86
    Request permission for commercial reuse | PDF file iconPDF (1138 KB) | HTML iconHTML
    Freely Available from IEEE
  • CS Connection

    Publication Year: 2015, Page(s):87 - 89
    Request permission for commercial reuse | PDF file iconPDF (4788 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2015, Page(s):90 - 93
    Request permission for commercial reuse | PDF file iconPDF (2003 KB)
    Freely Available from IEEE
  • Focus on Your Job Search [Advertisement]

    Publication Year: 2015, Page(s): 94
    Request permission for commercial reuse | PDF file iconPDF (1197 KB)
    Freely Available from IEEE
  • Accidents will happen [The Errant Hashtag]

    Publication Year: 2015, Page(s): 104
    Request permission for commercial reuse | PDF file iconPDF (328 KB) | HTML iconHTML
    Freely Available from IEEE
  • Rock Stars of CyberSecurity [Advertisement]

    Publication Year: 2015, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (1554 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org