Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
ACM Transactions on Privacy and Security
Association for Computing Machinery, Inc.
  1-2 of 2 reviews Date Reviewed 
  Skype & Type: keyboard eavesdropping in voice-over-IP
Cecconello S., Compagno A., Conti M., Lain D., Tsudik G.  ACM Transactions on Privacy and Security 22(4): 1-34, 2019. Type: Article

In our current environment, many people work remotely from their office and routinely use voice over Internet protocol (VoIP) tools for communicating with colleagues. During these voice calls, it is also quite common for participants to continue t...

Aug 24 2021
  Efficient attack graph analysis through approximate inference
Muñoz-González L., Sgandurra D., Paudice A., Lupu E.  ACM Transactions on Privacy and Security 20(3): 1-30, 2017. Type: Article

In the course of this very well-written and interesting research paper, the authors attempt to show how an existing technique can be employed to analyze attack graphs. In computer security, the analysis of attack graphs has been extensively used t...

Jan 24 2018
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy