Computer

Issue 4 • April 2018

Filter Results

Displaying Results 1 - 25 of 29
  • Front Cover 
  • Front Cover

    Publication Year: 2018, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2199 KB)
    Freely Available from IEEE
  • House Advertisement 
  • SHARE THE GIFT OF KNOWLEDGE: Give Your Favorite Student a Membership to the IEEE Computer Society!

    Publication Year: 2018, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (4533 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of Contents

    Publication Year: 2018, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (2047 KB)
    Freely Available from IEEE
  • Masthead 
  • Masthead

    Publication Year: 2018, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (153 KB)
    Freely Available from IEEE
  • Letters 
  • Letters

    Publication Year: 2018, Page(s):4 - 7
    Request permission for commercial reuse | PDF file iconPDF (748 KB) | HTML iconHTML
    Freely Available from IEEE
  • Elsewhere in the CS 
  • Computer Highlights Society Magazines

    Publication Year: 2018, Page(s):8 - 10
    Request permission for commercial reuse | PDF file iconPDF (1656 KB)
    Freely Available from IEEE
  • House Advertisement 
  • IEEE Computer Society Information

    Publication Year: 2018, Page(s): 11
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Spotlight on Transactions 
  • Non-Volatile Memory Trends: Toward Improving Density and Energy Profiles across the System Stack

    Publication Year: 2018, Page(s):12 - 13
    Request permission for commercial reuse | PDF file iconPDF (795 KB)
    Freely Available from IEEE
  • 50 & 25 Years Ago 
  • 50 & 25 Years Ago

    Publication Year: 2018, Page(s):14 - 15
    Request permission for commercial reuse | PDF file iconPDF (1472 KB) | HTML iconHTML
    Freely Available from IEEE
  • Guest Editor’s Introduction 
  • Cybersecurity: The Security and Protection Challenges of Our Digital World

    Publication Year: 2018, Page(s):16 - 19
    Request permission for commercial reuse | PDF file iconPDF (2216 KB)
    Freely Available from IEEE
  • Cover Feature 
  • End-to-End Trust and Security for Internet of Things Applications

    Publication Year: 2018, Page(s):20 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1942 KB) | HTML iconHTML

    Many Internet of Things (IoT) devices utilize the cloud to store data and synchronize with one another. Because data breaches can occur anywhere en route to the cloud, ensuring end-to-end trust and security for IoT applications is critical. The authors propose a novel 3D threat model for the IoT and discuss nine security and privacy challenges as well as several ways to mitigate risks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Game-Model-Based Network Security Risk Control

    Publication Year: 2018, Page(s):28 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2172 KB) | HTML iconHTML

    Network security decisions must consider how to balance information security risk and output in light of limited resources. Using game theory, the authors propose an optimum attack-defense decision-making algorithm that considers the interaction between attackers and defenders. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • Impact a broader audience

    Publication Year: 2018, Page(s): 39
    Request permission for commercial reuse | PDF file iconPDF (3261 KB)
    Freely Available from IEEE
  • Cover Feature 
  • Detecting Code Reuse Attacks with Branch Prediction

    Publication Year: 2018, Page(s):40 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1954 KB) | HTML iconHTML

    Code reuse attacks (CRAs) allow attackers to produce malicious results by using legitimate code binaries in memory. The authors propose incorporating control-flow validation into the processors instruction execution pipeline, along with a mis-prediction validation unit and a branch prediction unit, to help identify attacks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • Recognizing Excellence in High Performance Computing Nominations are Solicited for the Seymour Cray Sidney Fernbach and Ken Kennedy Awards

    Publication Year: 2018, Page(s): 48
    Request permission for commercial reuse | PDF file iconPDF (414 KB)
    Freely Available from IEEE
  • Take the CS Library wherever you go!

    Publication Year: 2018, Page(s): 49
    Request permission for commercial reuse | PDF file iconPDF (3134 KB)
    Freely Available from IEEE
  • Perspectives 
  • International Neuroscience Initiatives through the Lens of High-Performance Computing

    Publication Year: 2018, Page(s):50 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB) | HTML iconHTML

    Neuroscience initiatives aim to develop new technologies and tools to measure and manipulate neuronal circuits. To deal with the massive amounts of data generated by these tools, the authors envision the co-location of open data repositories in standardized formats together with high-performance computing hardware utilizing open source optimized analysis codes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research Feature 
  • What Are We Missing When Testing Our Android Apps?

    Publication Year: 2018, Page(s):60 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (966 KB) | HTML iconHTML

    Android's broad adoption drives the development of millions of new apps. Apps on this OS are not just trivial games; many of them handle sensitive information, exhibit complex structure, and require high reliability and trustworthiness. The authors discuss the problem of testing Android apps-the results achieved with current approaches, and what is still missing and requires fresh solutions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • IEEE Transactions on Big Data

    Publication Year: 2018, Page(s): 69
    Request permission for commercial reuse | PDF file iconPDF (519 KB)
    Freely Available from IEEE
  • Out of Band 
  • Weaponizing Twitter Litter: Abuse-Forming Networks and Social Media

    Publication Year: 2018, Page(s):70 - 73
    Request permission for commercial reuse | PDF file iconPDF (468 KB) | HTML iconHTML
    Freely Available from IEEE
  • Rebooting Computing 
  • Rebooting Computers to Avoid Meltdown and Spectre

    Publication Year: 2018, Page(s):74 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2032 KB) | HTML iconHTML

    Security vulnerabilities such as Meltdown and Spectre demonstrate how chip complexity grew faster than our ability to manage unintended consequences. Attention to security from the outset should be part of the rememdy, yet complexity must be controlled at a more fundamental level. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Policy Corner 
  • Net Neutrality: A Brief Overview of the Policy and the FCC’s Ruling to Upend It

    Publication Year: 2018, Page(s):78 - 81
    Request permission for commercial reuse | PDF file iconPDF (272 KB)
    Freely Available from IEEE
  • Cybertrust 
  • Penetration Testing in the IoT Age

    Publication Year: 2018, Page(s):82 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1321 KB) | HTML iconHTML

    Internet of Things (IoT) objects offer new services but also pose new security threats. Due to the heterogeneity, large number, and resource constraints of these objects, new penetration testing tools and techniques are needed to complement defensive mechanisms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The IoT Connection 
  • IoT’s Certification Quagmire

    Publication Year: 2018, Page(s):86 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (726 KB) | HTML iconHTML

    Certifying the Internet of Things (IoT) is an important but unachieved goal. Challenges include who does the certification and what to certify. The authors address these challenges and propose a way forward that applies to the IoT. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Standards 
  • Computer Society Standards Drive Industry

    Publication Year: 2018, Page(s):90 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (723 KB) | HTML iconHTML

    The IEEE Computer Society provides core standards for the benefit of industry including for networking, integrated circuit design and test, cloud computing and software and system engineering. These standards enable industry to move technology forward at a rapid pace in order to deliver amazing products to consumers. View full abstract»

    Open Access

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org