Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

The Spinning Cube of Potential Doom

Published: 01 June 2004 Publication History

Abstract

Practically every computer linked to the Internet is constantly being scanned for security vulnerabilities and targeted for attack by viruses, worms, and worse.

Cited By

View all
  • (2022)Research on prediction of security corresponding frequency based on GRU2nd International Conference on Artificial Intelligence, Automation, and High-Performance Computing (AIAHPC 2022)10.1117/12.2641476(80)Online publication date: 10-Nov-2022
  • (2021)Fuzzy integrated rough set theory situation feature extraction of network securityJournal of Intelligent & Fuzzy Systems10.3233/JIFS-189664(1-12)Online publication date: 6-Mar-2021
  • (2021)Assessing a Decision Support Tool for SOC AnalystsDigital Threats: Research and Practice10.1145/34307532:3(1-35)Online publication date: 8-Jun-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 47, Issue 6
Wireless sensor networks
June 2004
93 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/990680
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 2004
Published in CACM Volume 47, Issue 6

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)133
  • Downloads (Last 6 weeks)15
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Research on prediction of security corresponding frequency based on GRU2nd International Conference on Artificial Intelligence, Automation, and High-Performance Computing (AIAHPC 2022)10.1117/12.2641476(80)Online publication date: 10-Nov-2022
  • (2021)Fuzzy integrated rough set theory situation feature extraction of network securityJournal of Intelligent & Fuzzy Systems10.3233/JIFS-189664(1-12)Online publication date: 6-Mar-2021
  • (2021)Assessing a Decision Support Tool for SOC AnalystsDigital Threats: Research and Practice10.1145/34307532:3(1-35)Online publication date: 8-Jun-2021
  • (2021)Network Security Situation Prediction of Improved Lanchester Equation Based on Time Action FactorMobile Networks and Applications10.1007/s11036-020-01666-526:3(1008-1023)Online publication date: 1-Jun-2021
  • (2020)Security Visualization Extended Review Issues, Classifications, Validation Methods, Trends, ExtensionsResearch Anthology on Artificial Intelligence Applications in Security10.4018/978-1-7998-7705-9.ch054(1184-1229)Online publication date: 27-Nov-2020
  • (2020)Visual Analytics for Anomaly Classification in LAN Based on Deep Convolutional Neural Network2020 Joint 9th International Conference on Informatics, Electronics & Vision (ICIEV) and 2020 4th International Conference on Imaging, Vision & Pattern Recognition (icIVPR)10.1109/ICIEVicIVPR48672.2020.9306641(1-6)Online publication date: 26-Aug-2020
  • (2019)Network Security Situation Factor Extraction Based on Random Forest of Information GainProceedings of the 4th International Conference on Big Data and Computing10.1145/3335484.3335486(194-197)Online publication date: 10-May-2019
  • (2019)Construction of Cyber Range Network Security Indication System Based on Deep Learning2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC)10.1109/DSC.2019.00081(495-502)Online publication date: Jun-2019
  • (2019)What Makes for Effective Visualisation in Cyber Situational Awareness for Non-Expert Users?2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)10.1109/CyberSA.2019.8899440(1-8)Online publication date: Jun-2019
  • (2019)Anomaly Detection Using Pattern-of-Life Visual MetaphorsIEEE Access10.1109/ACCESS.2019.29484907(154018-154034)Online publication date: 2019
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media