w/in this Title
ACM Transactions on Privacy and Security
Association for Computing Machinery, Inc.
1-2 of 2 reviews
Skype & Type: keyboard eavesdropping in voice-over-IP
Cecconello S., Compagno A., Conti M., Lain D., Tsudik G. ACM Transactions on Privacy and Security 22(4): 1-34, 2019. Type: Article
In our current environment, many people work remotely from their office and routinely use voice over Internet protocol (VoIP) tools for communicating with colleagues. During these voice calls, it is also quite common for participants to continue t...
Aug 24 2021
Efficient attack graph analysis through approximate inference
Muñoz-González L., Sgandurra D., Paudice A., Lupu E. ACM Transactions on Privacy and Security 20(3): 1-30, 2017. Type: Article
In the course of this very well-written and interesting research paper, the authors attempt to show how an existing technique can be employed to analyze attack graphs. In computer security, the analysis of attack graphs has been extensively used t...
Jan 24 2018
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2021 ThinkLoud, Inc.