Author: Hal Berghel

Publication Overview

Publication period start: 2008
Number of co-authors: 12

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Berghel, Hal (2008): Faith-based security. In Communications of the ACM, 51 (4) pp. 13-17. https://dl.acm.org/doi/10.1145/1330311.1330315
Berghel, Hal (2008): BRAP forensics. In Communications of the ACM, 51 (6) pp. 15-20. https://dl.acm.org/doi/10.1145/1349026.1349030
Berghel, Hal (2007): Hiding data, forensics, and anti-forensics. In Communications of the ACM, 50 (4) pp. 15-20. https://dl.acm.org/doi/10.1145/1232743.1232761
Berghel, Hal (2007): Credit Card Forensics. In Communications of the ACM, 50 (12) pp. 11-14. https://dl.acm.org/doi/10.1145/1323688.1323708
Berghel, Hal (2006): Phishing mongers and posers. In Communications of the ACM, 49 (4) pp. 21-25. https://dl.acm.org/doi/10.1145/1121949.1121968
Berghel, Hal, Hoelzer, David (2006): Disk wiping by any other name. In Communications of the ACM, 49 (8) pp. 17-21. https://dl.acm.org/doi/10.1145/1145303
Berghel, Hal (2006): Fungible credentials and next-generation fraud. In Communications of the ACM, 49 (12) pp. 15-19. https://dl.acm.org/doi/10.1145/1183252
Berghel, Hal (2005): The two sides of ROI: return on investment vs. risk of incarceration. In Communications of the ACM, 48 (4) pp. 15-20. https://dl.acm.org/doi/10.1145/1053291.1053305
Berghel, Hal, Hoelzer, David (2005): Pernicious ports. In Communications of the ACM, 48 (12) pp. 23-30. https://dl.acm.org/doi/10.1145/1101779.1101798
Berghel, Hal, Uecker, Jacob (2005): WiFi attack vectors. In Communications of the ACM, 48 (8) pp. 21-28. https://dl.acm.org/doi/10.1145/1076211.1076229
Berghel, Hal (2004): Wireless infidelity I: war driving. In Communications of the ACM, 47 (9) pp. 21-26. https://dl.acm.org/doi/10.1145/1015864.1015879
Berghel, Hal, Brajkovska, Natasa (2004): Wading into alternate data streams. In Communications of the ACM, 47 (4) pp. 21-27. https://dl.acm.org/doi/10.1145/975817.975836
Berghel, Hal, Sallach, David L. (2004): A paradigm shift in computing and IT education. In Communications of the ACM, 47 (6) pp. 83-88. https://dl.acm.org/doi/10.1145/990680.990685
Berghel, Hal, Uecker, Jacob (2004): Wireless infidelity II: airjacking. In Communications of the ACM, 47 (12) pp. 15-20. https://dl.acm.org/doi/10.1145/1035134.1035149
Berghel, Hal (2003): The discipline of Internet forensics. In Communications of the ACM, 46 (8) pp. 15-20. https://dl.acm.org/doi/10.1145/859670.859687
Berghel, Hal (2003): Malware month. In Communications of the ACM, 46 (12) pp. 15-19. https://dl.acm.org/doi/10.1145/953460.953476
Berghel, Hal, Womack, Kim (2003): Anonymizing the net. In Communications of the ACM, 46 (4) pp. 15-20. https://dl.acm.org/doi/10.1145/641205.641220
Berghel, Hal (2002): Hijacking the web. In Communications of the ACM, 45 (4) pp. 23-27. https://dl.acm.org/doi/10.1145/505248.505263
Berghel, Hal (2002): Responsible web caching. In Communications of the ACM, 45 (9) pp. 15-20. https://dl.acm.org/doi/10.1145/567498.567514
Berghel, Hal (2001): Cyberprivacy in the New Millennium. In IEEE Computer, 34 (1) pp. 132-134. https://csdl.computer.org/comp/mags/co/2001/01/r1132abs.htm
Berghel, Hal (2001): A cyberpublishing manifesto. In Communications of the ACM, 44 (3) pp. 17-20. https://dl.acm.org/doi/10.1145/365181.365914
Berghel, Hal (2001): Caustic Cookies. In Communications of the ACM, 44 (5) pp. 19-22. https://dl.acm.org/doi/10.1145/374308.374320
Berghel, Hal (2001): The Y2K e-commerce tumble. In Communications of the ACM, 44 (8) pp. 15-17. https://dl.acm.org/doi/10.1145/381641.381648
Berghel, Hal (2001): The Code Red Worm. In Communications of the ACM, 44 (12) pp. 15-19. https://dl.acm.org/doi/10.1145/501317.501328
Berghel, Hal (2000): Identity Theft, Social Security Numbers, and the Web. In Communications of the ACM, 43 (2) pp. 17-21. https://dl.acm.org/doi/10.1145/328236.328114
Berghel, Hal (2000): Predatory Disintermediation. In Communications of the ACM, 43 (5) pp. 23-29. https://dl.acm.org/doi/10.1145/332833.332850
Berghel, Hal (2000): Digital Politics 2000. In Communications of the ACM, 43 (11) pp. 17-22. https://dl.acm.org/doi/10.1145/353360.353373
Berghel, Hal, Berleant, Daniel, Foy, Thomas, McGuire, Marcus (1999): Cyberbrowsing: Information Customization on the Web. In JASIST - Journal of the American Society for Information Science and Technology, 50 (6) pp. 505-511.
Berghel, Hal (1999): Value-Added Publishing. In Communications of the ACM, 42 (1) pp. 19-23. https://dl.acm.org/doi/10.1145/291469.291487
Berghel, Hal (1999): How Xday Figures in the Y2K Countdown. In Communications of the ACM, 42 (5) pp. 11-15. https://dl.acm.org/doi/10.1145/301353.301388
Berghel, Hal (1999): The Cost of Having Analog Executives in a Digital World. In Communications of the ACM, 42 (11) pp. 11-15. https://dl.acm.org/doi/10.1145/319382.319384
Berghel, Hal (1998): Who Won the Mosaic War?. In Communications of the ACM, 41 (10) pp. 13-16.
Berghel, Hal (1998): The Year-2000 Problem and the New Riddle of Induction. In Communications of the ACM, 41 (3) pp. 13-17.
Berghel, Hal (1997): Cyberspace 2000: Dealing with Information Overload. In Communications of the ACM, 40 (2) pp. 19-24.
Berghel, Hal (1997): Email - The Good, The Bad, and the Ugly. In Communications of the ACM, 40 (4) pp. 11-15.
Berghel, Hal (1997): Informal Logic on Both Sides of the CDA Debate. In Communications of the ACM, 40 (7) pp. 11-15.
Berghel, Hal (1997): Watermarking Cyberspace. In Communications of the ACM, 40 (11) pp. 19-24.
Berghel, Hal, Roach, David (1996): An Extension of Ukkonen's Enhanced Dynamic Programming ASM Algorithm. In ACM Transactions on Information Systems, 14 (1) pp. 94-106. https://www.acm.org/pubs/articles/journals/tois/1996-14-1/p94-berghel/p94-berghel.pdf
Berghel, Hal (1996): The Client\'s Side of the World-Wide Web. In Communications of the ACM, 39 (1) pp. 30-40.
Berghel, Hal (1996): Digital Politics. In Communications of the ACM, 39 (10) pp. 19-25.
Berghel, Hal (1996): HTML Compliance and the Return of the Test Pattern. In Communications of the ACM, 39 (2) pp. 19-22.
Berghel, Hal (1996): U.S. Technology Policy in the Information Age. In Communications of the ACM, 39 (6) pp. 15-18.
Berghel, Hal (1995): Using the WWW Test Pattern to check HTML Client Compliance. In IEEE Computer, 28 (9) pp. 63-65.
Berghel, Hal (1995): Maiden Voyage. In Communications of the ACM, 38 (11) pp. 25-27.
Berghel, Hal (1994): New Wave Prototyping: Use and Abuse of Vacuous Prototypes. In Interactions, 1 (2) pp. 49-54. https://www.acm.org/pubs/articles/journals/interactions/1994-1-2/p49-berghel/p49-berghel.pdf
Dallaire, Gene, Stark, Fortney H., Berghel, Hal (1984): Should Congress Provide Special Tax Incentives for Firms Donating Computers to Schools?. In Communications of the ACM, 27 (3) pp. 185-194.
Berghel, Hal, Roach, David (1990): Documentation Design Based upon Intuitive Feature Taxonomy and Use Logging. In: ACM Eighth International Conference on Systems Documentation , 1990, . pp. 63-68.
Roach, David, Berghel, Hal, Talburt, John R. (1990): An Interactive Source Code Commenter for Prolog Programs. In: ACM Eighth International Conference on Systems Documentation , 1990, . pp. 141-145.
Talburt, John R., Berghel, Hal, Roach, David (1990): RAP: Relocation Allowance Planner, A Rule-Based Expert System with Self-Defining Documenta. In: ACM Eighth International Conference on Systems Documentation , 1990, . pp. 147-150.
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel stuck? Want Freedom?

Get one powerful email each week, like 325,663 others.

Learn to design a life you love.

Next email in:
4
days
16
hrs
34
mins
44
secs