Author: Hal Berghel
Publication Overview
Publication period start: 2008
Number of co-authors: 12
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Berghel,
Hal
(2008):
Faith-based security.
In
Communications of the ACM,
51
(4)
pp. 13-17.
https://dl.acm.org/doi/10.1145/1330311.1330315
Berghel,
Hal
(2008):
BRAP forensics.
In
Communications of the ACM,
51
(6)
pp. 15-20.
https://dl.acm.org/doi/10.1145/1349026.1349030
Berghel,
Hal
(2007):
Hiding data, forensics, and anti-forensics.
In
Communications of the ACM,
50
(4)
pp. 15-20.
https://dl.acm.org/doi/10.1145/1232743.1232761
Berghel,
Hal
(2007):
Credit Card Forensics.
In
Communications of the ACM,
50
(12)
pp. 11-14.
https://dl.acm.org/doi/10.1145/1323688.1323708
Berghel,
Hal
(2006):
Phishing mongers and posers.
In
Communications of the ACM,
49
(4)
pp. 21-25.
https://dl.acm.org/doi/10.1145/1121949.1121968
Berghel,
Hal,
Hoelzer,
David
(2006):
Disk wiping by any other name.
In
Communications of the ACM,
49
(8)
pp. 17-21.
https://dl.acm.org/doi/10.1145/1145303
Berghel,
Hal
(2006):
Fungible credentials and next-generation fraud.
In
Communications of the ACM,
49
(12)
pp. 15-19.
https://dl.acm.org/doi/10.1145/1183252
Berghel,
Hal
(2005):
The two sides of ROI: return on investment vs. risk of incarceration.
In
Communications of the ACM,
48
(4)
pp. 15-20.
https://dl.acm.org/doi/10.1145/1053291.1053305
Berghel,
Hal,
Hoelzer,
David
(2005):
Pernicious ports.
In
Communications of the ACM,
48
(12)
pp. 23-30.
https://dl.acm.org/doi/10.1145/1101779.1101798
Berghel,
Hal,
Uecker,
Jacob
(2005):
WiFi attack vectors.
In
Communications of the ACM,
48
(8)
pp. 21-28.
https://dl.acm.org/doi/10.1145/1076211.1076229
Berghel,
Hal
(2004):
Wireless infidelity I: war driving.
In
Communications of the ACM,
47
(9)
pp. 21-26.
https://dl.acm.org/doi/10.1145/1015864.1015879
Berghel,
Hal,
Brajkovska,
Natasa
(2004):
Wading into alternate data streams.
In
Communications of the ACM,
47
(4)
pp. 21-27.
https://dl.acm.org/doi/10.1145/975817.975836
Berghel,
Hal,
Sallach,
David L.
(2004):
A paradigm shift in computing and IT education.
In
Communications of the ACM,
47
(6)
pp. 83-88.
https://dl.acm.org/doi/10.1145/990680.990685
Berghel,
Hal,
Uecker,
Jacob
(2004):
Wireless infidelity II: airjacking.
In
Communications of the ACM,
47
(12)
pp. 15-20.
https://dl.acm.org/doi/10.1145/1035134.1035149
Berghel,
Hal
(2003):
The discipline of Internet forensics.
In
Communications of the ACM,
46
(8)
pp. 15-20.
https://dl.acm.org/doi/10.1145/859670.859687
Berghel,
Hal
(2003):
Malware month.
In
Communications of the ACM,
46
(12)
pp. 15-19.
https://dl.acm.org/doi/10.1145/953460.953476
Berghel,
Hal,
Womack,
Kim
(2003):
Anonymizing the net.
In
Communications of the ACM,
46
(4)
pp. 15-20.
https://dl.acm.org/doi/10.1145/641205.641220
Berghel,
Hal
(2002):
Hijacking the web.
In
Communications of the ACM,
45
(4)
pp. 23-27.
https://dl.acm.org/doi/10.1145/505248.505263
Berghel,
Hal
(2002):
Responsible web caching.
In
Communications of the ACM,
45
(9)
pp. 15-20.
https://dl.acm.org/doi/10.1145/567498.567514
Berghel,
Hal
(2001):
Cyberprivacy in the New Millennium.
In
IEEE Computer,
34
(1)
pp. 132-134.
https://csdl.computer.org/comp/mags/co/2001/01/r1132abs.htm
Berghel,
Hal
(2001):
A cyberpublishing manifesto.
In
Communications of the ACM,
44
(3)
pp. 17-20.
https://dl.acm.org/doi/10.1145/365181.365914
Berghel,
Hal
(2001):
Caustic Cookies.
In
Communications of the ACM,
44
(5)
pp. 19-22.
https://dl.acm.org/doi/10.1145/374308.374320
Berghel,
Hal
(2001):
The Y2K e-commerce tumble.
In
Communications of the ACM,
44
(8)
pp. 15-17.
https://dl.acm.org/doi/10.1145/381641.381648
Berghel,
Hal
(2001):
The Code Red Worm.
In
Communications of the ACM,
44
(12)
pp. 15-19.
https://dl.acm.org/doi/10.1145/501317.501328
Berghel,
Hal
(2000):
Identity Theft, Social Security Numbers, and the Web.
In
Communications of the ACM,
43
(2)
pp. 17-21.
https://dl.acm.org/doi/10.1145/328236.328114
Berghel,
Hal
(2000):
Predatory Disintermediation.
In
Communications of the ACM,
43
(5)
pp. 23-29.
https://dl.acm.org/doi/10.1145/332833.332850
Berghel,
Hal
(2000):
Digital Politics 2000.
In
Communications of the ACM,
43
(11)
pp. 17-22.
https://dl.acm.org/doi/10.1145/353360.353373
Berghel,
Hal,
Berleant,
Daniel,
Foy,
Thomas,
McGuire,
Marcus
(1999):
Cyberbrowsing: Information Customization on the Web.
In
JASIST - Journal of the American Society for Information Science and Technology,
50
(6)
pp. 505-511.
Berghel,
Hal
(1999):
Value-Added Publishing.
In
Communications of the ACM,
42
(1)
pp. 19-23.
https://dl.acm.org/doi/10.1145/291469.291487
Berghel,
Hal
(1999):
How Xday Figures in the Y2K Countdown.
In
Communications of the ACM,
42
(5)
pp. 11-15.
https://dl.acm.org/doi/10.1145/301353.301388
Berghel,
Hal
(1999):
The Cost of Having Analog Executives in a Digital World.
In
Communications of the ACM,
42
(11)
pp. 11-15.
https://dl.acm.org/doi/10.1145/319382.319384
Berghel,
Hal
(1998):
Who Won the Mosaic War?.
In
Communications of the ACM,
41
(10)
pp. 13-16.
Berghel,
Hal
(1998):
The Year-2000 Problem and the New Riddle of Induction.
In
Communications of the ACM,
41
(3)
pp. 13-17.
Berghel,
Hal
(1997):
Cyberspace 2000: Dealing with Information Overload.
In
Communications of the ACM,
40
(2)
pp. 19-24.
Berghel,
Hal
(1997):
Email - The Good, The Bad, and the Ugly.
In
Communications of the ACM,
40
(4)
pp. 11-15.
Berghel,
Hal
(1997):
Informal Logic on Both Sides of the CDA Debate.
In
Communications of the ACM,
40
(7)
pp. 11-15.
Berghel,
Hal
(1997):
Watermarking Cyberspace.
In
Communications of the ACM,
40
(11)
pp. 19-24.
Berghel,
Hal,
Roach,
David
(1996):
An Extension of Ukkonen's Enhanced Dynamic Programming ASM Algorithm.
In
ACM Transactions on Information Systems,
14
(1)
pp. 94-106.
https://www.acm.org/pubs/articles/journals/tois/1996-14-1/p94-berghel/p94-berghel.pdf
Berghel,
Hal
(1996):
The Client\'s Side of the World-Wide Web.
In
Communications of the ACM,
39
(1)
pp. 30-40.
Berghel,
Hal
(1996):
Digital Politics.
In
Communications of the ACM,
39
(10)
pp. 19-25.
Berghel,
Hal
(1996):
HTML Compliance and the Return of the Test Pattern.
In
Communications of the ACM,
39
(2)
pp. 19-22.
Berghel,
Hal
(1996):
U.S. Technology Policy in the Information Age.
In
Communications of the ACM,
39
(6)
pp. 15-18.
Berghel,
Hal
(1995):
Using the WWW Test Pattern to check HTML Client Compliance.
In
IEEE Computer,
28
(9)
pp. 63-65.
Berghel,
Hal
(1995):
Maiden Voyage.
In
Communications of the ACM,
38
(11)
pp. 25-27.
Berghel,
Hal
(1994):
New Wave Prototyping: Use and Abuse of Vacuous Prototypes.
In
Interactions,
1
(2)
pp. 49-54.
https://www.acm.org/pubs/articles/journals/interactions/1994-1-2/p49-berghel/p49-berghel.pdf
Dallaire,
Gene,
Stark,
Fortney H.,
Berghel,
Hal
(1984):
Should Congress Provide Special Tax Incentives for Firms Donating Computers to Schools?.
In
Communications of the ACM,
27
(3)
pp. 185-194.
Berghel,
Hal,
Roach,
David
(1990):
Documentation Design Based upon Intuitive Feature Taxonomy and Use Logging.
In:
ACM Eighth International Conference on Systems Documentation
,
1990,
.
pp. 63-68.
Roach,
David,
Berghel,
Hal,
Talburt,
John R.
(1990):
An Interactive Source Code Commenter for Prolog Programs.
In:
ACM Eighth International Conference on Systems Documentation
,
1990,
.
pp. 141-145.
Talburt,
John R.,
Berghel,
Hal,
Roach,
David
(1990):
RAP: Relocation Allowance Planner, A Rule-Based Expert System with Self-Defining Documenta.
In:
ACM Eighth International Conference on Systems Documentation
,
1990,
.
pp. 147-150.