research-article

The cybersecurity risk

Abstract

Increased attention to cybersecurity has not resulted in improved cybersecurity.

References

  1. C compilers may silently discard some wraparound checks. US-CERT Vulnerability Note VU#162289, April 4, 2008.Google ScholarGoogle Scholar
  2. Domenici, H. and Bari, A. The Price of Cybersecurity: Big Investments, Small Improvements. A. Holmes, Ed., Bloomberg Government Survey (Jan. 31, 2012).Google ScholarGoogle Scholar
  3. Landwehr, C. A national goal for cyberspace: Create an open, accountable Internet. IEEE Security and Privacy 7, 3 (May 2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. OS Platform Statistics, w3schools.com; http://www.w3schools.com/browsers/browsers_os.asp.Google ScholarGoogle Scholar
  5. Roemer, R. Buchanan, E., Shacham, H., and Savage, S. Return-oriented programming: Systems, languages, and applications. ACM Trans. Info. Syst. Secur. 5, 1, Article 2 (Mar. 2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. "STEM" The Tide: Should America Try to Prevent and Exodus of Foreign Graduates of U.S. Universities with Advanced Science Degrees. Hearing Before the Subcommittee on Immigration Policy and Enforcement of the Committee on the Judiciary of House of Representatives (Oct. 5, 2011), 112--164.Google ScholarGoogle Scholar

Index Terms

  1. The cybersecurity risk

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!