2008 |
67 | | Hal Berghel,
David Hoelzer,
Michael Sthultz:
Data Hiding Tactics for Windows and Unix File Systems.
Advances in Computers 74: 1-17 (2008) |
66 | EE | Hal Berghel:
Faith-based security.
Commun. ACM 51(4): 13-17 (2008) |
65 | EE | Hal Berghel:
BRAP forensics.
Commun. ACM 51(6): 15-20 (2008) |
2007 |
64 | | Hal Berghel,
James Carpinter,
Ju-Yeon Jo:
Phish Phactors: Offensive and Defensive Strategies.
Advances in Computers 70: 223-268 (2007) |
63 | EE | Hal Berghel:
Credit Card Forensics.
Commun. ACM 50(12): 11-14 (2007) |
62 | EE | Hal Berghel:
Hiding data, forensics, and anti-forensics.
Commun. ACM 50(4): 15-20 (2007) |
61 | EE | Hal Berghel:
Better-than-nothing security practices.
Commun. ACM 50(8): 15-18 (2007) |
2006 |
60 | | Michael Sthultz,
Jacob Uecker,
Hal Berghel:
Wireless Insecurities.
Advances in Computers 67: 226-253 (2006) |
59 | EE | Hal Berghel:
Fungible credentials and next-generation fraud.
Commun. ACM 49(12): 15-19 (2006) |
58 | EE | Hal Berghel:
Phishing mongers and posers.
Commun. ACM 49(4): 21-25 (2006) |
57 | EE | Hal Berghel,
David Hoelzer:
Disk wiping by any other name.
Commun. ACM 49(8): 17-21 (2006) |
2005 |
56 | | John V. Harrison,
Hal Berghel:
A Protocol Layer Survey of Network Security.
Advances in Computers 64: 110-159 (2005) |
55 | EE | Hal Berghel,
David Hoelzer:
Pernicious ports.
Commun. ACM 48(12): 23-30 (2005) |
54 | EE | Hal Berghel:
The two sides of ROI: return on investment vs. risk of incarceration.
Commun. ACM 48(4): 15-20 (2005) |
53 | EE | Hal Berghel,
Jacob Uecker:
WiFi attack vectors.
Commun. ACM 48(8): 21-28 (2005) |
2004 |
52 | EE | Hal Berghel,
Jacob Uecker:
Wireless infidelity II: airjacking.
Commun. ACM 47(12): 15-20 (2004) |
51 | EE | Hal Berghel,
Natasa Brajkovska:
Wading into alternate data streams.
Commun. ACM 47(4): 21-27 (2004) |
50 | EE | Hal Berghel,
David L. Sallach:
A paradigm shift in computing and IT education.
Commun. ACM 47(6): 83-88 (2004) |
49 | EE | Hal Berghel:
Wireless infidelity I: war driving.
Commun. ACM 47(9): 21-26 (2004) |
2003 |
48 | EE | Hal Berghel:
Malware month.
Commun. ACM 46(12): 15-19 (2003) |
47 | EE | Hal Berghel,
Kim Womack:
Anonymizing the net.
Commun. ACM 46(4): 15-20 (2003) |
46 | EE | Hal Berghel:
The discipline of Internet forensics.
Commun. ACM 46(8): 15-20 (2003) |
2002 |
45 | EE | Hal Berghel:
Hijacking the web.
Commun. ACM 45(4): 23-27 (2002) |
44 | EE | Hal Berghel:
Responsible web caching.
Commun. ACM 45(9): 15-20 (2002) |
2001 |
43 | EE | Hal Berghel:
A decade of applied computing.
SAC 2001: 1-5 |
42 | EE | Hal Berghel:
The Code Red Worm.
Commun. ACM 44(12): 15-19 (2001) |
41 | EE | Hal Berghel:
A cyberpublishing manifesto.
Commun. ACM 44(3): 17-20 (2001) |
40 | EE | Hal Berghel:
Caustic Cookies.
Commun. ACM 44(5): 19-22 (2001) |
39 | EE | Hal Berghel:
The Y2K e-commerce tumble.
Commun. ACM 44(8): 15-17 (2001) |
38 | EE | Hal Berghel:
Cyberprivacy in the New Millennium.
IEEE Computer 34(1): 132-134 (2001) |
2000 |
37 | EE | Hal Berghel:
Digital Politics 2000.
Commun. ACM 43(11): 17-22 (2000) |
36 | EE | Hal Berghel:
Identity Theft, Social Security Numbers, and the Web.
Commun. ACM 43(2): 17-21 (2000) |
35 | EE | Hal Berghel:
Predatory Disintermediation.
Commun. ACM 43(5): 23-29 (2000) |
1999 |
34 | | Hal Berghel,
Douglas Blank:
The World Wide Web.
Advances in Computers 48: 180-219 (1999) |
33 | EE | Hal Berghel:
Value-Added Publishing.
Commun. ACM 42(1): 19-23 (1999) |
32 | EE | Hal Berghel:
The Cost of Having Analog Executives in a Digital World.
Commun. ACM 42(11): 11-15 (1999) |
31 | EE | Hal Berghel:
How Xday Figures in the Y2K Countdown.
Commun. ACM 42(5): 11-15 (1999) |
30 | | Hal Berghel,
Daniel Berleant,
Thomas Foy,
Marcus McGuire:
Cyberbrowsing: Information Customization on the Web.
JASIS 50(6): 505-511 (1999) |
1998 |
29 | | Hal Berghel:
Who Won the Mosaic War?
Commun. ACM 41(10): 13-16 (1998) |
28 | | Hal Berghel:
The Year-2000 Problem and the New Riddle of Induction.
Commun. ACM 41(3): 13-17 (1998) |
1997 |
27 | | Hal Berghel:
Watermarking Cyberspace.
Commun. ACM 40(11): 19-24 (1997) |
26 | | Hal Berghel:
Cyberspace 2000: Dealing with Information Overload.
Commun. ACM 40(2): 19-24 (1997) |
25 | | Hal Berghel:
Email - The Good, The Bad, and the Ugly.
Commun. ACM 40(4): 11-15 (1997) |
24 | | Hal Berghel:
Informal Logic on Both Sides of the CDA Debate.
Commun. ACM 40(7): 11-15 (1997) |
1996 |
23 | EE | Hal Berghel,
David Roach:
An Extension of Ukkonen's Enhanced Dynamic Programming ASM Algorithm.
ACM Trans. Inf. Syst. 14(1): 94-106 (1996) |
22 | | Hal Berghel:
The Client's Side of the World-Wide Web.
Commun. ACM 39(1): 30-40 (1996) |
21 | | Hal Berghel:
Digital Politics.
Commun. ACM 39(10): 19-25 (1996) |
20 | | Hal Berghel:
HTML Compliance and the Return of the Test Pattern.
Commun. ACM 39(2): 19-22 (1996) |
19 | | Hal Berghel:
U.S. Technology Policy in the Information Age.
Commun. ACM 39(6): 15-18 (1996) |
1995 |
18 | EE | Hal Berghel:
CYBER-SURFING: the state-of-the-art in client server browsing and navigation.
SAC 1995: 1-4 |
17 | | Hal Berghel:
Maiden Voyage.
Commun. ACM 38(11): 25-27 (1995) |
16 | | Hal Berghel:
Using the WWW Test Pattern to check HTML Client Compliance.
IEEE Computer 28(9): 63-65 (1995) |
1994 |
15 | EE | Hal Berghel:
New wave prototyping: use and abuse of vacuous prototypes.
Interactions 1(2): 49-54 (1994) |
1993 |
14 | EE | Gordon Beavers,
Hal Berghel:
"Dynamic" Inferencing with Generalized Resolution.
SAC 1993: 614-621 |
1990 |
13 | EE | David Roach,
Hal Berghel,
John R. Talburt:
An interactive source commenter for Prolog programs.
SIGDOC 1990: 141-145 |
12 | EE | Hal Berghel,
David Roach:
Documentation design based upon intuitive feature taxonomy and use logging.
SIGDOC 1990: 63-68 |
11 | EE | David Roach,
Hal Berghel:
The Physiology of PROLOG Expert System Inference Engine.
SIGSMALL/PC Symposium 1990: 1-5 |
10 | EE | Richard Rankin,
Hal Berghel,
T. Xu:
Efficient Generation of Lexically Proper Palindromes.
SIGSMALL/PC Symposium 1990: 151-155 |
9 | EE | Hal Berghel,
Richard Rankin,
Farrukh Burney:
An Approach to Tableau Inferencing with "Hardwired" Heuristics.
SIGSMALL/PC Symposium 1990: 90-93 |
8 | | Hal Berghel,
Richard Rankin:
A Proposed Standard for Measuring Crossword Compilation Efficiency.
Comput. J. 33(2): 181-184 (1990) |
1989 |
7 | | Hal Berghel,
C. Yi:
Crossword Compiler-Compilation.
Comput. J. 32(3): 276-280 (1989) |
1988 |
6 | EE | Hal Berghel,
C. Andreu:
TALISMAN: A Prototype Expert System for Spelling Correction.
SIGSMALL/PC 1988: 107-113 |
5 | EE | Hal Berghel,
Richard Rankin,
Sanjiv K. Bhatia:
MS-DOS Prolog implementations revisited.
SIGPLAN Notices 23(1): 127-134 (1988) |
1987 |
4 | | Hal Berghel:
Crossword Compilation with Horn Clauses.
Comput. J. 30(2): 183-188 (1987) |
3 | EE | Hal Berghel:
A logical framework for the correction of spelling errors in electronic documents.
Inf. Process. Manage. 23(5): 477-494 (1987) |
1985 |
2 | EE | Hal Berghel:
Simplified Integration of Prolog with RDBMS.
DATA BASE 16(3): 3-12 (1985) |
1984 |
1 | | Gene Dallaire,
Fortney H. Stark,
Hal Berghel:
Should Congress Provide Special Tax Incentives for Firms Donating Computers to Schools?
Commun. ACM 27(3): 185-194 (1984) |