| 2008 |
| 67 | | Hal Berghel,
David Hoelzer,
Michael Sthultz:
Data Hiding Tactics for Windows and Unix File Systems.
Advances in Computers 74: 1-17 (2008) |
| 66 | EE | Hal Berghel:
Faith-based security.
Commun. ACM 51(4): 13-17 (2008) |
| 65 | EE | Hal Berghel:
BRAP forensics.
Commun. ACM 51(6): 15-20 (2008) |
| 2007 |
| 64 | | Hal Berghel,
James Carpinter,
Ju-Yeon Jo:
Phish Phactors: Offensive and Defensive Strategies.
Advances in Computers 70: 223-268 (2007) |
| 63 | EE | Hal Berghel:
Credit Card Forensics.
Commun. ACM 50(12): 11-14 (2007) |
| 62 | EE | Hal Berghel:
Hiding data, forensics, and anti-forensics.
Commun. ACM 50(4): 15-20 (2007) |
| 61 | EE | Hal Berghel:
Better-than-nothing security practices.
Commun. ACM 50(8): 15-18 (2007) |
| 2006 |
| 60 | | Michael Sthultz,
Jacob Uecker,
Hal Berghel:
Wireless Insecurities.
Advances in Computers 67: 226-253 (2006) |
| 59 | EE | Hal Berghel:
Fungible credentials and next-generation fraud.
Commun. ACM 49(12): 15-19 (2006) |
| 58 | EE | Hal Berghel:
Phishing mongers and posers.
Commun. ACM 49(4): 21-25 (2006) |
| 57 | EE | Hal Berghel,
David Hoelzer:
Disk wiping by any other name.
Commun. ACM 49(8): 17-21 (2006) |
| 2005 |
| 56 | | John V. Harrison,
Hal Berghel:
A Protocol Layer Survey of Network Security.
Advances in Computers 64: 110-159 (2005) |
| 55 | EE | Hal Berghel,
David Hoelzer:
Pernicious ports.
Commun. ACM 48(12): 23-30 (2005) |
| 54 | EE | Hal Berghel:
The two sides of ROI: return on investment vs. risk of incarceration.
Commun. ACM 48(4): 15-20 (2005) |
| 53 | EE | Hal Berghel,
Jacob Uecker:
WiFi attack vectors.
Commun. ACM 48(8): 21-28 (2005) |
| 2004 |
| 52 | EE | Hal Berghel,
Jacob Uecker:
Wireless infidelity II: airjacking.
Commun. ACM 47(12): 15-20 (2004) |
| 51 | EE | Hal Berghel,
Natasa Brajkovska:
Wading into alternate data streams.
Commun. ACM 47(4): 21-27 (2004) |
| 50 | EE | Hal Berghel,
David L. Sallach:
A paradigm shift in computing and IT education.
Commun. ACM 47(6): 83-88 (2004) |
| 49 | EE | Hal Berghel:
Wireless infidelity I: war driving.
Commun. ACM 47(9): 21-26 (2004) |
| 2003 |
| 48 | EE | Hal Berghel:
Malware month.
Commun. ACM 46(12): 15-19 (2003) |
| 47 | EE | Hal Berghel,
Kim Womack:
Anonymizing the net.
Commun. ACM 46(4): 15-20 (2003) |
| 46 | EE | Hal Berghel:
The discipline of Internet forensics.
Commun. ACM 46(8): 15-20 (2003) |
| 2002 |
| 45 | EE | Hal Berghel:
Hijacking the web.
Commun. ACM 45(4): 23-27 (2002) |
| 44 | EE | Hal Berghel:
Responsible web caching.
Commun. ACM 45(9): 15-20 (2002) |
| 2001 |
| 43 | EE | Hal Berghel:
A decade of applied computing.
SAC 2001: 1-5 |
| 42 | EE | Hal Berghel:
The Code Red Worm.
Commun. ACM 44(12): 15-19 (2001) |
| 41 | EE | Hal Berghel:
A cyberpublishing manifesto.
Commun. ACM 44(3): 17-20 (2001) |
| 40 | EE | Hal Berghel:
Caustic Cookies.
Commun. ACM 44(5): 19-22 (2001) |
| 39 | EE | Hal Berghel:
The Y2K e-commerce tumble.
Commun. ACM 44(8): 15-17 (2001) |
| 38 | EE | Hal Berghel:
Cyberprivacy in the New Millennium.
IEEE Computer 34(1): 132-134 (2001) |
| 2000 |
| 37 | EE | Hal Berghel:
Digital Politics 2000.
Commun. ACM 43(11): 17-22 (2000) |
| 36 | EE | Hal Berghel:
Identity Theft, Social Security Numbers, and the Web.
Commun. ACM 43(2): 17-21 (2000) |
| 35 | EE | Hal Berghel:
Predatory Disintermediation.
Commun. ACM 43(5): 23-29 (2000) |
| 1999 |
| 34 | | Hal Berghel,
Douglas Blank:
The World Wide Web.
Advances in Computers 48: 180-219 (1999) |
| 33 | EE | Hal Berghel:
Value-Added Publishing.
Commun. ACM 42(1): 19-23 (1999) |
| 32 | EE | Hal Berghel:
The Cost of Having Analog Executives in a Digital World.
Commun. ACM 42(11): 11-15 (1999) |
| 31 | EE | Hal Berghel:
How Xday Figures in the Y2K Countdown.
Commun. ACM 42(5): 11-15 (1999) |
| 30 | | Hal Berghel,
Daniel Berleant,
Thomas Foy,
Marcus McGuire:
Cyberbrowsing: Information Customization on the Web.
JASIS 50(6): 505-511 (1999) |
| 1998 |
| 29 | | Hal Berghel:
Who Won the Mosaic War?
Commun. ACM 41(10): 13-16 (1998) |
| 28 | | Hal Berghel:
The Year-2000 Problem and the New Riddle of Induction.
Commun. ACM 41(3): 13-17 (1998) |
| 1997 |
| 27 | | Hal Berghel:
Watermarking Cyberspace.
Commun. ACM 40(11): 19-24 (1997) |
| 26 | | Hal Berghel:
Cyberspace 2000: Dealing with Information Overload.
Commun. ACM 40(2): 19-24 (1997) |
| 25 | | Hal Berghel:
Email - The Good, The Bad, and the Ugly.
Commun. ACM 40(4): 11-15 (1997) |
| 24 | | Hal Berghel:
Informal Logic on Both Sides of the CDA Debate.
Commun. ACM 40(7): 11-15 (1997) |
| 1996 |
| 23 | EE | Hal Berghel,
David Roach:
An Extension of Ukkonen's Enhanced Dynamic Programming ASM Algorithm.
ACM Trans. Inf. Syst. 14(1): 94-106 (1996) |
| 22 | | Hal Berghel:
The Client's Side of the World-Wide Web.
Commun. ACM 39(1): 30-40 (1996) |
| 21 | | Hal Berghel:
Digital Politics.
Commun. ACM 39(10): 19-25 (1996) |
| 20 | | Hal Berghel:
HTML Compliance and the Return of the Test Pattern.
Commun. ACM 39(2): 19-22 (1996) |
| 19 | | Hal Berghel:
U.S. Technology Policy in the Information Age.
Commun. ACM 39(6): 15-18 (1996) |
| 1995 |
| 18 | EE | Hal Berghel:
CYBER-SURFING: the state-of-the-art in client server browsing and navigation.
SAC 1995: 1-4 |
| 17 | | Hal Berghel:
Maiden Voyage.
Commun. ACM 38(11): 25-27 (1995) |
| 16 | | Hal Berghel:
Using the WWW Test Pattern to check HTML Client Compliance.
IEEE Computer 28(9): 63-65 (1995) |
| 1994 |
| 15 | EE | Hal Berghel:
New wave prototyping: use and abuse of vacuous prototypes.
Interactions 1(2): 49-54 (1994) |
| 1993 |
| 14 | EE | Gordon Beavers,
Hal Berghel:
"Dynamic" Inferencing with Generalized Resolution.
SAC 1993: 614-621 |
| 1990 |
| 13 | EE | David Roach,
Hal Berghel,
John R. Talburt:
An interactive source commenter for Prolog programs.
SIGDOC 1990: 141-145 |
| 12 | EE | Hal Berghel,
David Roach:
Documentation design based upon intuitive feature taxonomy and use logging.
SIGDOC 1990: 63-68 |
| 11 | EE | David Roach,
Hal Berghel:
The Physiology of PROLOG Expert System Inference Engine.
SIGSMALL/PC Symposium 1990: 1-5 |
| 10 | EE | Richard Rankin,
Hal Berghel,
T. Xu:
Efficient Generation of Lexically Proper Palindromes.
SIGSMALL/PC Symposium 1990: 151-155 |
| 9 | EE | Hal Berghel,
Richard Rankin,
Farrukh Burney:
An Approach to Tableau Inferencing with "Hardwired" Heuristics.
SIGSMALL/PC Symposium 1990: 90-93 |
| 8 | | Hal Berghel,
Richard Rankin:
A Proposed Standard for Measuring Crossword Compilation Efficiency.
Comput. J. 33(2): 181-184 (1990) |
| 1989 |
| 7 | | Hal Berghel,
C. Yi:
Crossword Compiler-Compilation.
Comput. J. 32(3): 276-280 (1989) |
| 1988 |
| 6 | EE | Hal Berghel,
C. Andreu:
TALISMAN: A Prototype Expert System for Spelling Correction.
SIGSMALL/PC 1988: 107-113 |
| 5 | EE | Hal Berghel,
Richard Rankin,
Sanjiv K. Bhatia:
MS-DOS Prolog implementations revisited.
SIGPLAN Notices 23(1): 127-134 (1988) |
| 1987 |
| 4 | | Hal Berghel:
Crossword Compilation with Horn Clauses.
Comput. J. 30(2): 183-188 (1987) |
| 3 | EE | Hal Berghel:
A logical framework for the correction of spelling errors in electronic documents.
Inf. Process. Manage. 23(5): 477-494 (1987) |
| 1985 |
| 2 | EE | Hal Berghel:
Simplified Integration of Prolog with RDBMS.
DATA BASE 16(3): 3-12 (1985) |
| 1984 |
| 1 | | Gene Dallaire,
Fortney H. Stark,
Hal Berghel:
Should Congress Provide Special Tax Incentives for Firms Donating Computers to Schools?
Commun. ACM 27(3): 185-194 (1984) |