dblp.uni-trier.dewww.uni-trier.de

Hal Berghel

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
67 Hal Berghel, David Hoelzer, Michael Sthultz: Data Hiding Tactics for Windows and Unix File Systems. Advances in Computers 74: 1-17 (2008)
66EEHal Berghel: Faith-based security. Commun. ACM 51(4): 13-17 (2008)
65EEHal Berghel: BRAP forensics. Commun. ACM 51(6): 15-20 (2008)
2007
64 Hal Berghel, James Carpinter, Ju-Yeon Jo: Phish Phactors: Offensive and Defensive Strategies. Advances in Computers 70: 223-268 (2007)
63EEHal Berghel: Credit Card Forensics. Commun. ACM 50(12): 11-14 (2007)
62EEHal Berghel: Hiding data, forensics, and anti-forensics. Commun. ACM 50(4): 15-20 (2007)
61EEHal Berghel: Better-than-nothing security practices. Commun. ACM 50(8): 15-18 (2007)
2006
60 Michael Sthultz, Jacob Uecker, Hal Berghel: Wireless Insecurities. Advances in Computers 67: 226-253 (2006)
59EEHal Berghel: Fungible credentials and next-generation fraud. Commun. ACM 49(12): 15-19 (2006)
58EEHal Berghel: Phishing mongers and posers. Commun. ACM 49(4): 21-25 (2006)
57EEHal Berghel, David Hoelzer: Disk wiping by any other name. Commun. ACM 49(8): 17-21 (2006)
2005
56 John V. Harrison, Hal Berghel: A Protocol Layer Survey of Network Security. Advances in Computers 64: 110-159 (2005)
55EEHal Berghel, David Hoelzer: Pernicious ports. Commun. ACM 48(12): 23-30 (2005)
54EEHal Berghel: The two sides of ROI: return on investment vs. risk of incarceration. Commun. ACM 48(4): 15-20 (2005)
53EEHal Berghel, Jacob Uecker: WiFi attack vectors. Commun. ACM 48(8): 21-28 (2005)
2004
52EEHal Berghel, Jacob Uecker: Wireless infidelity II: airjacking. Commun. ACM 47(12): 15-20 (2004)
51EEHal Berghel, Natasa Brajkovska: Wading into alternate data streams. Commun. ACM 47(4): 21-27 (2004)
50EEHal Berghel, David L. Sallach: A paradigm shift in computing and IT education. Commun. ACM 47(6): 83-88 (2004)
49EEHal Berghel: Wireless infidelity I: war driving. Commun. ACM 47(9): 21-26 (2004)
2003
48EEHal Berghel: Malware month. Commun. ACM 46(12): 15-19 (2003)
47EEHal Berghel, Kim Womack: Anonymizing the net. Commun. ACM 46(4): 15-20 (2003)
46EEHal Berghel: The discipline of Internet forensics. Commun. ACM 46(8): 15-20 (2003)
2002
45EEHal Berghel: Hijacking the web. Commun. ACM 45(4): 23-27 (2002)
44EEHal Berghel: Responsible web caching. Commun. ACM 45(9): 15-20 (2002)
2001
43EEHal Berghel: A decade of applied computing. SAC 2001: 1-5
42EEHal Berghel: The Code Red Worm. Commun. ACM 44(12): 15-19 (2001)
41EEHal Berghel: A cyberpublishing manifesto. Commun. ACM 44(3): 17-20 (2001)
40EEHal Berghel: Caustic Cookies. Commun. ACM 44(5): 19-22 (2001)
39EEHal Berghel: The Y2K e-commerce tumble. Commun. ACM 44(8): 15-17 (2001)
38EEHal Berghel: Cyberprivacy in the New Millennium. IEEE Computer 34(1): 132-134 (2001)
2000
37EEHal Berghel: Digital Politics 2000. Commun. ACM 43(11): 17-22 (2000)
36EEHal Berghel: Identity Theft, Social Security Numbers, and the Web. Commun. ACM 43(2): 17-21 (2000)
35EEHal Berghel: Predatory Disintermediation. Commun. ACM 43(5): 23-29 (2000)
1999
34 Hal Berghel, Douglas Blank: The World Wide Web. Advances in Computers 48: 180-219 (1999)
33EEHal Berghel: Value-Added Publishing. Commun. ACM 42(1): 19-23 (1999)
32EEHal Berghel: The Cost of Having Analog Executives in a Digital World. Commun. ACM 42(11): 11-15 (1999)
31EEHal Berghel: How Xday Figures in the Y2K Countdown. Commun. ACM 42(5): 11-15 (1999)
30 Hal Berghel, Daniel Berleant, Thomas Foy, Marcus McGuire: Cyberbrowsing: Information Customization on the Web. JASIS 50(6): 505-511 (1999)
1998
29 Hal Berghel: Who Won the Mosaic War? Commun. ACM 41(10): 13-16 (1998)
28 Hal Berghel: The Year-2000 Problem and the New Riddle of Induction. Commun. ACM 41(3): 13-17 (1998)
1997
27 Hal Berghel: Watermarking Cyberspace. Commun. ACM 40(11): 19-24 (1997)
26 Hal Berghel: Cyberspace 2000: Dealing with Information Overload. Commun. ACM 40(2): 19-24 (1997)
25 Hal Berghel: Email - The Good, The Bad, and the Ugly. Commun. ACM 40(4): 11-15 (1997)
24 Hal Berghel: Informal Logic on Both Sides of the CDA Debate. Commun. ACM 40(7): 11-15 (1997)
1996
23EEHal Berghel, David Roach: An Extension of Ukkonen's Enhanced Dynamic Programming ASM Algorithm. ACM Trans. Inf. Syst. 14(1): 94-106 (1996)
22 Hal Berghel: The Client's Side of the World-Wide Web. Commun. ACM 39(1): 30-40 (1996)
21 Hal Berghel: Digital Politics. Commun. ACM 39(10): 19-25 (1996)
20 Hal Berghel: HTML Compliance and the Return of the Test Pattern. Commun. ACM 39(2): 19-22 (1996)
19 Hal Berghel: U.S. Technology Policy in the Information Age. Commun. ACM 39(6): 15-18 (1996)
1995
18EEHal Berghel: CYBER-SURFING: the state-of-the-art in client server browsing and navigation. SAC 1995: 1-4
17 Hal Berghel: Maiden Voyage. Commun. ACM 38(11): 25-27 (1995)
16 Hal Berghel: Using the WWW Test Pattern to check HTML Client Compliance. IEEE Computer 28(9): 63-65 (1995)
1994
15EEHal Berghel: New wave prototyping: use and abuse of vacuous prototypes. Interactions 1(2): 49-54 (1994)
1993
14EEGordon Beavers, Hal Berghel: "Dynamic" Inferencing with Generalized Resolution. SAC 1993: 614-621
1990
13EEDavid Roach, Hal Berghel, John R. Talburt: An interactive source commenter for Prolog programs. SIGDOC 1990: 141-145
12EEHal Berghel, David Roach: Documentation design based upon intuitive feature taxonomy and use logging. SIGDOC 1990: 63-68
11EEDavid Roach, Hal Berghel: The Physiology of PROLOG Expert System Inference Engine. SIGSMALL/PC Symposium 1990: 1-5
10EERichard Rankin, Hal Berghel, T. Xu: Efficient Generation of Lexically Proper Palindromes. SIGSMALL/PC Symposium 1990: 151-155
9EEHal Berghel, Richard Rankin, Farrukh Burney: An Approach to Tableau Inferencing with "Hardwired" Heuristics. SIGSMALL/PC Symposium 1990: 90-93
8 Hal Berghel, Richard Rankin: A Proposed Standard for Measuring Crossword Compilation Efficiency. Comput. J. 33(2): 181-184 (1990)
1989
7 Hal Berghel, C. Yi: Crossword Compiler-Compilation. Comput. J. 32(3): 276-280 (1989)
1988
6EEHal Berghel, C. Andreu: TALISMAN: A Prototype Expert System for Spelling Correction. SIGSMALL/PC 1988: 107-113
5EEHal Berghel, Richard Rankin, Sanjiv K. Bhatia: MS-DOS Prolog implementations revisited. SIGPLAN Notices 23(1): 127-134 (1988)
1987
4 Hal Berghel: Crossword Compilation with Horn Clauses. Comput. J. 30(2): 183-188 (1987)
3EEHal Berghel: A logical framework for the correction of spelling errors in electronic documents. Inf. Process. Manage. 23(5): 477-494 (1987)
1985
2EEHal Berghel: Simplified Integration of Prolog with RDBMS. DATA BASE 16(3): 3-12 (1985)
1984
1 Gene Dallaire, Fortney H. Stark, Hal Berghel: Should Congress Provide Special Tax Incentives for Firms Donating Computers to Schools? Commun. ACM 27(3): 185-194 (1984)

Coauthor Index

1C. Andreu [6]
2Gordon Beavers [14]
3Daniel Berleant [30]
4Sanjiv K. Bhatia [5]
5Douglas Blank [34]
6Natasa Brajkovska [51]
7Farrukh Burney [9]
8James Carpinter [64]
9Gene Dallaire [1]
10Thomas Foy [30]
11John V. Harrison [56]
12David Hoelzer [55] [57] [67]
13Ju-Yeon Jo [64]
14Marcus McGuire [30]
15Richard Rankin [5] [8] [9] [10]
16David Roach [11] [12] [13] [23]
17David L. Sallach [50]
18Fortney H. Stark [1]
19Michael Sthultz [60] [67]
20John R. Talburt [13]
21Jacob Uecker [52] [53] [60]
22Kim Womack [47]
23T. Xu [10]
24C. Yi [7]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)