Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

Computer

Issue 3 • Mar. 2016

Filter Results

Displaying Results 1 - 25 of 30
  • Front Cover 
  • Front Cover

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2284 KB)
    Freely Available from IEEE
  • Rock Stars of Risk-Based Security

    Publication Year: 2016, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (1065 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of Contents

    Publication Year: 2016, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (2207 KB)
    Freely Available from IEEE
  • 70th Anniversary Milestones 
  • Bodies of Knowledge

    Publication Year: 2016, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (746 KB) | HTML iconHTML
    Freely Available from IEEE
  • Masthead 
  • Masthead

    Publication Year: 2016, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • Spotlight on Transactions 
  • Using 2D Maps for 3D Localization

    Publication Year: 2016, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (1614 KB)
    Freely Available from IEEE
  • Elsewhere in the CS 
  • Computer Highlights Society Magazines

    Publication Year: 2016, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (1720 KB)
    Freely Available from IEEE
  • 32 & 16 Years Ago 
  • 32 & 16 Years Ago

    Publication Year: 2016, Page(s):8 - 9
    Request permission for commercial reuse | PDF file iconPDF (902 KB) | HTML iconHTML
    Freely Available from IEEE
  • Guest Editors' Introduction 
  • Communications and Privacy under Surveillance

    Publication Year: 2016, Page(s):10 - 13
    Request permission for commercial reuse | PDF file iconPDF (2749 KB) | HTML iconHTML
    Freely Available from IEEE
  • Communications and Privacy Under Surveillance 
  • Insecure Surveillance: Technical Issues with Remote Computer Searches

    Publication Year: 2016, Page(s):14 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1744 KB) | HTML iconHTML

    Proposed changes to federal rules authorizing warrants for remote computer searches mistake victims for criminals, confuse legitimate uses of location-anonymizing software with nefarious activity, and are likely to be both intrusive and damaging, creating serious security problems and potentially compromising criminal investigations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Insecure by Design: Protocols for Encrypted Phone Calls

    Publication Year: 2016, Page(s):25 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (923 KB) | HTML iconHTML

    It is increasingly clear that existing phone security mechanisms are inadequate and that change is necessary. Instead of protecting phone conversations from eavesdropping, the UK government's proposed voice encryption standard appears to be designed to facilitate undetectable mass surveillance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements Analysis Required--Otherwise Targeted Monitoring Enables Pervasive Monitoring

    Publication Year: 2016, Page(s):34 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1112 KB) | HTML iconHTML

    Lawful interception was developed in a closed manner and is usable for pervasive monitoring, which the Internet community has deemed an attack. Further developing lawful interception technology is therefore counter-productive unless accompanied by an open re-evaluation of targeted monitoring requirements assigning equal priority to requirements for security, privacy, and Internet-scale interoperab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for nominees

    Publication Year: 2016, Page(s): 41
    Request permission for commercial reuse | PDF file iconPDF (780 KB)
    Freely Available from IEEE
  • Communications and Privacy Under Surveillance 
  • How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation

    Publication Year: 2016, Page(s):42 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1855 KB) | HTML iconHTML

    A popular choice for anonymous Internet communication, the Tor network uses entry, relay, and exit nodes to hide the traffic's origin. However, an investigation that involved running real applications and website requests through Tor revealed numerous agglomerations of exiting traffic that an attacker could exploit. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Passive Measurements to Demystify Online Trackers

    Publication Year: 2016, Page(s):50 - 55
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1247 KB) | HTML iconHTML

    The Internet revolution has led to the rise of trackers-online tracking services that shadow users' browsing activity. Despite the pervasiveness of online tracking, few users install privacy-enhancing plug-ins. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research Feature 
  • Mitigating Cross-Site Scripting Attacks with a Content Security Policy

    Publication Year: 2016, Page(s):56 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1540 KB) | HTML iconHTML

    A content security policy (CSP) can help Web application developers and server administrators better control website content and avoid vulnerabilities to cross-site scripting (XSS). In experiments with a prototype website, the authors' CSP implementation successfully mitigated all XSS attack types in four popular browsers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic, Cognitive, and Perceptual Computing: Paradigms That Shape Human Experience

    Publication Year: 2016, Page(s):64 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1142 KB) | HTML iconHTML

    Unlike machine-centric computing, in which efficient data processing takes precedence over contextual tailoring, human-centric computation provides a personalized data interpretation that most users find highly relevant to their needs. The authors show how semantic, cognitive, and perceptual computing paradigms work together to produce actionable information. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Out of Band 
  • Net Neutrality vs. Net Neutering

    Publication Year: 2016, Page(s):73 - 77
    Request permission for commercial reuse | PDF file iconPDF (1039 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cloud Cover 
  • Trustworthy Digital Forensics in the Cloud

    Publication Year: 2016, Page(s):78 - 81
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1490 KB) | HTML iconHTML

    Digital forensics is used to help investigate cybercrime. Because of its characteristics and rapid adoption, the cloud requires its own form of forensics, which must be reliable. The authors have developed the Open Cloud Forensics (OCF) model and FECloud architecture, which would enable effective cloud forensics. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aftershock 
  • The STEM Anxiety Business

    Publication Year: 2016, Page(s):82 - 87
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (964 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computing Education 
  • The IEEE Computer Society and ACM's Collaboration on Computing Education

    Publication Year: 2016, Page(s):88 - 91
    Request permission for commercial reuse | PDF file iconPDF (1477 KB) | HTML iconHTML
    Freely Available from IEEE
  • Standards 
  • Practical Insights from the Peculiar World of Standards

    Publication Year: 2016, Page(s):92 - 96
    Request permission for commercial reuse | PDF file iconPDF (2083 KB) | HTML iconHTML
    Freely Available from IEEE
  • Social Computing 
  • How Socially Aware Are Social Media Privacy Controls?

    Publication Year: 2016, Page(s):96 - 99
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1605 KB) | HTML iconHTML

    Social media sites are key mediators of online communication. Yet the privacy controls for these sites are not fully socially aware, even when privacy management is known to be fundamental to successful social relationships. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Student Design Showcase 
  • Immortal Bits: Managing Our Digital Legacies

    Publication Year: 2016, Page(s):100 - 103
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1662 KB) | HTML iconHTML

    An Ulster University student designed a Website to help manage and deliver digital assets after death. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cybertrust 
  • On the Move: Evading Distributed Denial-of-Service Attacks

    Publication Year: 2016, Page(s):104 - 107
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1737 KB) | HTML iconHTML

    A proposed moving-target defense against DDoS attacks repeatedly shuffles client-to-server assignments to identify and eventually quarantine malicious clients. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org