Yost, Jeffrey R. (Author)
As part of a broader prehistory and history of early intrusion-detection systems (IDSs), this article focuses on the first such system, Intrusion Detection Expert System (IDES), which was developed in the second half of the 1980s at SRI International (and SRI's follow-on Next Generation Intrusion Detection Expert System, or NIDES, in the early-to-mid 1990s). It also briefly recounts other early IDSs and the National Security Agency's Computer Misuse and Anomaly Detection (CMAD) Program, and it analyzes the disproportionately high contributions of women scientists to leadership in IDS research and development relative to other computer security specialties.
...MoreArticle Yost, Jeffrey R. (2016) Computer Security, Part 2 -- Editor's Introduction. IEEE Annals of the History of Computing (pp. 10-11).
Article
Aspray, William F.;
Cortada, James W.;
(2016)
Before It Was a Giant: The Early History of Symantec, 1982-1999
(/isis/citation/CBB189385729/)
Article
Mirowski, Alexander;
(2017)
At the Electronic Crossroads Once Again: The Myth of the Modern Computer Utility in the United States
(/isis/citation/CBB369914463/)
Article
Kneuper, Ralf;
(2017)
Sixty Years of Software Development Life Cycle Models
(/isis/citation/CBB236951329/)
Article
DuPont, Quinn;
Fidler, Bradley;
(2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity
(/isis/citation/CBB760734420/)
Article
Misa, Thomas J.;
(2016)
Computer Security Discourse at RAND, SDC, and NSA (1958-1970)
(/isis/citation/CBB851516279/)
Article
Yost, Jeffrey R.;
(2016)
Computer Security, Part 2 -- Editor's Introduction
(/isis/citation/CBB453922047/)
Review
Salem Elzway;
(2017)
Review of "The Outsourcer: The story of India's IT revolution"
(/isis/citation/CBB610334077/)
Article
Nyman, Linus;
Laakso, Mikael;
(2016)
Anecdote: Notes on the History of Fork and Join
(/isis/citation/CBB424414308/)
Article
Peter Andras;
Lukas Esterle;
Michael Guckert;
The Anh Han;
Peter R. Lewis;
Kristina Milanovic;
Terry Payne;
Cedric Perret;
Jeremy Pitt;
Simon T. Powers;
Neil Urquhart;
Simon Wells;
(December 2018)
Trusting Intelligent Machines: Deepening Trust Within Socio-Technical Systems
(/isis/citation/CBB573643849/)
Book
Andrew J. Stewart;
(2021)
A Vulnerable System: The History of Information Security in the Computer Age
(/isis/citation/CBB486585682/)
Book
Brian Hochman;
(2022)
The Listeners: A History of Wiretapping in the United States
(/isis/citation/CBB775086796/)
Book
Duane C. Wilson;
(2021)
Cybersecurity
(/isis/citation/CBB201310866/)
Article
Baker, Kevin T.;
(2017)
Simulation and “Seduction” at the Policy Interface
(/isis/citation/CBB450364367/)
Article
Lewis, Nicholas;
(2017)
Purchasing Power: Rivalry, Dissent, and Computing Strategy in Supercomputer Selection at Los Alamos
(/isis/citation/CBB909353193/)
Review
McCray, W. Patrick;
(2016)
Review of "Inside the Machine: Art and Invention in the Electronic Age"
(/isis/citation/CBB765321999/)
Article
Smith, Alvy Ray;
(2016)
The Dawn of Digital Light
(/isis/citation/CBB962237102/)
Book
Yost, Jeffrey R.;
(2005)
The computer industry
(/isis/citation/CBB001180688/)
Article
Vogel, William F.;
(2017)
"The Spitting Image of a Woman Programmer": Changing Portrayals of Women in the American Computing Industry, 1958-1985
(/isis/citation/CBB857910207/)
Article
Cortada, James W.;
(2002)
Studying the increased use of software applications: Insights from the case of the American petroleum industry, 1950--2000
(/isis/citation/CBB001180897/)
Article
Ensmenger, Nathan;
(2017)
From the Editor's Desk
(/isis/citation/CBB143265022/)
Be the first to comment!