Fingerprint The fingerprint is based on mining the text of the scientific documents related to the associated persons. Based on that an index of weighted terms is created, which defines the key subjects of research unit

History Engineering & Materials Science
Security of data Engineering & Materials Science
Industry Engineering & Materials Science
Software Arts & Humanities
Resources Arts & Humanities
discipline Social Sciences
software Social Sciences
Intrusion detection Engineering & Materials Science

Projects 2007 2015

Security of data
History
History of computing
Contemporary history
Research methods

Research Output 2001 2016

  • 3 Chapter
  • 3 Review article
  • 2 Article
  • 1 Conference contribution

The March of IDES: Early History of Intrusion-Detection Expert Systems

Yost, J. R. Oct 1 2016 In : IEEE Annals of the History of Computing. 38, 4, p. 42-54 13 p.

Research output: Contribution to journalArticle

Intrusion detection
Intrusion
Expert systems
Expert system
History

Computer Security [Guest editors' introduction]

Yost, J. R. Apr 1 2015 In : IEEE Annals of the History of Computing. 37, 2, p. 6-7 2 p., 7116454

Research output: Contribution to journalReview article

Security of data
History
Headlines
Annals
1960s
3 Citations

The Origin and Early History of the Computer Security Software Products Industry

Yost, J. R. Apr 1 2015 In : IEEE Annals of the History of Computing. 37, 2, p. 46-58 13 p., 7116464

Research output: Contribution to journalReview article

Access control
Control facilities
Security of data
Industry
Software