Computer

Issue 4 • April 2017

Filter Results

Displaying Results 1 - 25 of 28
  • Front Cover 
  • Front Cover

    Publication Year: 2017, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (304 KB)
    Freely Available from IEEE
  • House Advertisement 
  • New Membership Options for a Better Fit

    Publication Year: 2017, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (146 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of Contents

    Publication Year: 2017, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (274 KB)
    Freely Available from IEEE
  • Masthead 
  • Masthead

    Publication Year: 2017, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Elsewhere in the CS 
  • Elsewhere in the CS

    Publication Year: 2017, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (843 KB)
    Freely Available from IEEE
  • 50 & 25 Years Ago 
  • 50 & 25 Years Ago

    Publication Year: 2017, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (575 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computing 
  • Cybersecurity and the Future

    Publication Year: 2017, Page(s): 7
    Request permission for commercial reuse | PDF file iconPDF (828 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computer's Legacy 
  • The Intel 8086 Chip and the Future of Microprocessor Design

    Publication Year: 2017, Page(s):8 - 9
    Request permission for commercial reuse | PDF file iconPDF (282 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computing Conversations 
  • Resurrecting the CDC 6500 Supercomputer

    Publication Year: 2017, Page(s):10 - 12
    Request permission for commercial reuse | PDF file iconPDF (564 KB) | HTML iconHTML
    Freely Available from IEEE
  • Spotlight on Transactions 
  • A High-level Language for Interactive Data Visualization

    Publication Year: 2017, Page(s): 13
    Request permission for commercial reuse | PDF file iconPDF (162 KB)
    Freely Available from IEEE
  • Guest Editor's Introduction 
  • Cyber-Physical Systems

    Publication Year: 2017, Page(s):14 - 16
    Request permission for commercial reuse | PDF file iconPDF (375 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cyber-Physical Systems 
  • Using Information-Flow Methods to Analyze the Security of Cyber-Physical Systems

    Publication Year: 2017, Page(s):17 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1129 KB) | HTML iconHTML

    Securing information flow is essential to methods that must ensure confidentiality, but information-flow disruption is equally important because it points to an integrity vulnerability. A proposed security model addresses both aspects, accounting for cyber-physical systems' unique confidentiality and integrity vulnerabilities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cloud-Integrated, Multilayered, Agent-Based Cyber-Physical System Architecture

    Publication Year: 2017, Page(s):27 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (539 KB) | HTML iconHTML

    The cloud computing infrastructure has the power to increase the dependability, interoperability, and scalability of emerging cyber-physical systems (CPSs). Integrating intelligent agents and semantic ontologies can help manage the complexity of such systems and enable the development of large-scale CPSs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The (Not) Far-Away Path to Smart Cyber-Physical Systems: An Information-Centric Framework

    Publication Year: 2017, Page(s):38 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    Advances in embedded systems and communication technologies--along with the availability of low-cost sensors--have led to a pervasive presence of cyber-physical systems. However, several intelligent functionalities that are necessary to meet user and application demands are missing from current solutions. A homogeneous and integrated framework supporting intelligent mechanisms can fill this gap. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editors' Introduction 
  • New Frontiers: Assessing and Managing Security Risks

    Publication Year: 2017, Page(s):48 - 51
    Request permission for commercial reuse | PDF file iconPDF (779 KB) | HTML iconHTML
    Freely Available from IEEE
  • Security Risk Assessment 
  • Information Security Risk Assessment: A Method Comparison

    Publication Year: 2017, Page(s):52 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    Numerous methods for information security risk assessment (ISRA) are available, yet there is little guidance on how to choose one. Through a comprehensive risk identification, estimation, and evaluation framework, the author evaluates the practical application of three ISRA methods in terms of tasks required, user experience, and results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Enhanced Risk-Assessment Methodology for Smart Grids

    Publication Year: 2017, Page(s):62 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (519 KB) | HTML iconHTML

    Cyberattacks on power grids are pushing threat and risk assessment to another complexity level. As part of its scope, the EU's Security for Smart Electricity Grids (SEGRID) project was tasked with building on existing methods to address the interdependencies characteristic of a smart grid. The authors describe the resulting methodology. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Determining and Sharing Risk Data in Distributed Interdependent Systems

    Publication Year: 2017, Page(s):72 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB) | HTML iconHTML

    Any risk analysis of a large infrastructure that does not account for external dependencies is dangerously introspective. A top-down, goal-to-dependencies modeling approach can capture interdependencies and allow supply-chain entities to securely share risk data, calculate the likely impact of a failure, and respond accordingly. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perspectives 
  • A Face in any Form: New Challenges and Opportunities for Face Recognition Technology

    Publication Year: 2017, Page(s):80 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (782 KB) | HTML iconHTML

    Despite new technologies that make face detection and recognition more sophisticated, long-recognized problems in security, privacy, and accuracy persist. Refining this technology and introducing it into new domains will require solving these problems through focused interdisciplinary efforts among developers, researchers, and policymakers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The IoT Connection 
  • Extending the Cloud to the Network Edge

    Publication Year: 2017, Page(s):91 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Telefónica's OnLife project aims to virtualize the access network and give third-party Internet of Things application developers and content providers cloud-computing capabilities at the network edge. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rebooting Computing 
  • Computer Architecture's Changing Role in Rebooting Computing

    Publication Year: 2017, Page(s):96 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    Researchers are now considering alternatives to the von Neumann computer architecture as a way to improve performance. The current approach of simulating benchmark applications favors continued use of the von Neumann architecture, but architects can help overcome this bias. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cybertrust 
  • Shining Light on the Dark Web

    Publication Year: 2017, Page(s):100 - 105
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (450 KB) | HTML iconHTML

    Traditional endpoint protection will not address the looming cybersecurity crisis because it ignores the source of the problem--the vast online black market buried deep within the Internet. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Indistinguishable from Magic 
  • Smartwatches: Digital Handcuffs or Magic Bracelets?

    Publication Year: 2017, Page(s):106 - 109
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    Some regard the smartwatch as little more than an extra phone screen, but it can be a powerful tool that reduces the time we spend using other devices, enabling us to better manage our digital lives without missing out on important information. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Out of Band 
  • Alt-News and Post-Truths in the "Fake News" Era

    Publication Year: 2017, Page(s):110 - 114
    Request permission for commercial reuse | PDF file iconPDF (314 KB) | HTML iconHTML
    Freely Available from IEEE
  • Call and Calendar 
  • Call and Calendar

    Publication Year: 2017, Page(s):115 - 119
    Request permission for commercial reuse | PDF file iconPDF (167 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org