acm - an acm publication
Follow us on social media...

Peter J. Denning, Editor in ChiefThe digitally connected world has become a large, swirling sea of information stripped of context. We help our readers make sense of it, find meaning in it, learn what to trust, and speculate on our future.

Peter J. Denning,
Editor-in-Chief

 

LATEST ARTICLES
Communication Corner

How to improve your writing by standing on your head

June 2017
by Philip Yaffe

Cyber-attacks and breaches are often detected too late to avoid damage. In this article we examine the ability of redundancy-based anomaly detectors to recognize some high-risk and difficult to detect attacks on web servers. We discuss practical relevance of the approach in the context of providing high-assurance Web-services that may belong to autonomous IoT applications and devices. ...


Commentary

10 rules for an unhackable data vault

May 2017
by James B. Morris

Cyber-attacks and breaches are often detected too late to avoid damage. In this article we examine the ability of redundancy-based anomaly detectors to recognize some high-risk and difficult to detect attacks on web servers. We discuss practical relevance of the approach in the context of providing high-assurance Web-services that may belong to autonomous IoT applications and devices. ...



Interview

Cybersecurity skeptics now embracing formal methods: an interview with Gernot Heiser and Jim Morris

May 2017
Interviewed by Ted G. Lewis

Cyber-attacks and breaches are often detected too late to avoid damage. In this article we examine the ability of redundancy-based anomaly detectors to recognize some high-risk and difficult to detect attacks on web servers. We discuss practical relevance of the approach in the context of providing high-assurance Web-services that may belong to autonomous IoT applications and devices. ...


Commentary

The glorious promise of the post-truth world

March 2017
by Andrew Odlyzko

Cyber-attacks and breaches are often detected too late to avoid damage. In this article we examine the ability of redundancy-based anomaly detectors to recognize some high-risk and difficult to detect attacks on web servers. We discuss practical relevance of the approach in the context of providing high-assurance Web-services that may belong to autonomous IoT applications and devices. ...