acm - an acm publication
Follow us on social media...

Peter J. Denning, Editor in ChiefThe digitally connected world has become a large, swirling sea of information stripped of context. We help our readers make sense of it, find meaning in it, learn what to trust, and speculate on our future.

Peter J. Denning,
Editor-in-Chief

 

Ubiquity Has Been Upgraded!

  • You can propose article ideas to our editors—see Make A Pitch.
  • We are seeking for high-quality, reader submitted video content.
  • The editorial board has been organized into topic areas.
  • We are beefing up the Next-Gen Panel. Volunteer!
  • Our blog is being phased out and will be replaced by opinion commentaries.

LATEST ARTICLES

Symposium

When Good Machine Learning Leads to Bad Security: Big Data (Ubiquity symposium)

by Tegjyot Singh Sethi, Mehmed Kantardzic

Cyber-attacks and breaches are often detected too late to avoid damage. In this article we examine the ability of redundancy-based anomaly detectors to recognize some high-risk and difficult to detect attacks on web servers. We discuss practical relevance of the approach in the context of providing high-assurance Web-services that may belong to autonomous IoT applications and devices. ...


Communication Corner

First write like you speak, then write like you write

by Philip Yaffe

Cyber-attacks and breaches are often detected too late to avoid damage. In this article we examine the ability of redundancy-based anomaly detectors to recognize some high-risk and difficult to detect attacks on web servers. We discuss practical relevance of the approach in the context of providing high-assurance Web-services that may belong to autonomous IoT applications and devices. ...



Symposium

Developing an Open Source 'Big Data' Cognitive Computing Platform: Big Data (Ubiquity symposium)

March 2018
by Michael Kowolenko, Mladen A. Vouk

Cyber-attacks and breaches are often detected too late to avoid damage. In this article we examine the ability of redundancy-based anomaly detectors to recognize some high-risk and difficult to detect attacks on web servers. We discuss practical relevance of the approach in the context of providing high-assurance Web-services that may belong to autonomous IoT applications and devices. ...


Symposium

High Performance Synthetic Information Environments
An integrating architecture in the age of pervasive data and computing: Big Data (Ubiquity symposium)

March 2018
by Christopher L. Barrett, Jeffrey Johnson, Madhav Marathe

Cyber-attacks and breaches are often detected too late to avoid damage. In this article we examine the ability of redundancy-based anomaly detectors to recognize some high-risk and difficult to detect attacks on web servers. We discuss practical relevance of the approach in the context of providing high-assurance Web-services that may belong to autonomous IoT applications and devices. ...