acm - an acm publication
Follow us on social media...

Peter J. Denning, Editor in ChiefThe digitally connected world has become a large, swirling sea of information stripped of context. We help our readers make sense of it, find meaning in it, learn what to trust, and speculate on our future.

Peter J. Denning,
Editor-in-Chief

 

LATEST ARTICLES
Interview

Cybersecurity skeptics now embracing formal methods: an interview with Gernot Heiser and Jim Morris

May 2017
Interviewed by Ted G. Lewis

Cyber-attacks and breaches are often detected too late to avoid damage. In this article we examine the ability of redundancy-based anomaly detectors to recognize some high-risk and difficult to detect attacks on web servers. We discuss practical relevance of the approach in the context of providing high-assurance Web-services that may belong to autonomous IoT applications and devices. ...


Commentary

The glorious promise of the post-truth world

March 2017
by Andrew Odlyzko

Cyber-attacks and breaches are often detected too late to avoid damage. In this article we examine the ability of redundancy-based anomaly detectors to recognize some high-risk and difficult to detect attacks on web servers. We discuss practical relevance of the approach in the context of providing high-assurance Web-services that may belong to autonomous IoT applications and devices. ...



department

The three acid tests of persuasive writing

March 2017
by Philip Yaffe

Cyber-attacks and breaches are often detected too late to avoid damage. In this article we examine the ability of redundancy-based anomaly detectors to recognize some high-risk and difficult to detect attacks on web servers. We discuss practical relevance of the approach in the context of providing high-assurance Web-services that may belong to autonomous IoT applications and devices. ...


department

How an Ugly Duckling Became a Swan

December 2016
by Philip Yaffe

Cyber-attacks and breaches are often detected too late to avoid damage. In this article we examine the ability of redundancy-based anomaly detectors to recognize some high-risk and difficult to detect attacks on web servers. We discuss practical relevance of the approach in the context of providing high-assurance Web-services that may belong to autonomous IoT applications and devices. ...