Publications

Publication period start: 2008
Number of co-authors: 12

Co-authors

Number of publications with favourite co-authors
David Hoelzer
2
Jacob Uecker
2
David Roach
4

Productive Colleagues

Most productive colleagues in number of publications
David Roach
4
John R. Talburt
4
Daniel Berleant
6

Publications

Berghel, Hal (2008): Faith-based security. In Communications of the ACM, 51 (4) pp. 13-17. https://dl.acm.org/doi/10.1145/1330311.1330315

Berghel, Hal (2008): BRAP forensics. In Communications of the ACM, 51 (6) pp. 15-20. https://dl.acm.org/doi/10.1145/1349026.1349030

Berghel, Hal (2007): Hiding data, forensics, and anti-forensics. In Communications of the ACM, 50 (4) pp. 15-20. https://dl.acm.org/doi/10.1145/1232743.1232761

Berghel, Hal (2007): Credit Card Forensics. In Communications of the ACM, 50 (12) pp. 11-14. https://dl.acm.org/doi/10.1145/1323688.1323708

Berghel, Hal (2006): Phishing mongers and posers. In Communications of the ACM, 49 (4) pp. 21-25. https://dl.acm.org/doi/10.1145/1121949.1121968

Berghel, Hal, Hoelzer, David (2006): Disk wiping by any other name. In Communications of the ACM, 49 (8) pp. 17-21. https://dl.acm.org/doi/10.1145/1145303

Berghel, Hal (2006): Fungible credentials and next-generation fraud. In Communications of the ACM, 49 (12) pp. 15-19. https://dl.acm.org/doi/10.1145/1183252

Berghel, Hal (2005): The two sides of ROI: return on investment vs. risk of incarceration. In Communications of the ACM, 48 (4) pp. 15-20. https://dl.acm.org/doi/10.1145/1053291.1053305

Berghel, Hal, Hoelzer, David (2005): Pernicious ports. In Communications of the ACM, 48 (12) pp. 23-30. https://dl.acm.org/doi/10.1145/1101779.1101798

Berghel, Hal, Uecker, Jacob (2005): WiFi attack vectors. In Communications of the ACM, 48 (8) pp. 21-28. https://dl.acm.org/doi/10.1145/1076211.1076229

Berghel, Hal (2004): Wireless infidelity I: war driving. In Communications of the ACM, 47 (9) pp. 21-26. https://dl.acm.org/doi/10.1145/1015864.1015879

Berghel, Hal, Brajkovska, Natasa (2004): Wading into alternate data streams. In Communications of the ACM, 47 (4) pp. 21-27. https://dl.acm.org/doi/10.1145/975817.975836

Berghel, Hal, Sallach, David L. (2004): A paradigm shift in computing and IT education. In Communications of the ACM, 47 (6) pp. 83-88. https://dl.acm.org/doi/10.1145/990680.990685

Berghel, Hal, Uecker, Jacob (2004): Wireless infidelity II: airjacking. In Communications of the ACM, 47 (12) pp. 15-20. https://dl.acm.org/doi/10.1145/1035134.1035149

Berghel, Hal (2003): The discipline of Internet forensics. In Communications of the ACM, 46 (8) pp. 15-20. https://dl.acm.org/doi/10.1145/859670.859687

Berghel, Hal (2003): Malware month. In Communications of the ACM, 46 (12) pp. 15-19. https://dl.acm.org/doi/10.1145/953460.953476

Berghel, Hal, Womack, Kim (2003): Anonymizing the net. In Communications of the ACM, 46 (4) pp. 15-20. https://dl.acm.org/doi/10.1145/641205.641220

Berghel, Hal (2002): Hijacking the web. In Communications of the ACM, 45 (4) pp. 23-27. https://dl.acm.org/doi/10.1145/505248.505263

Berghel, Hal (2002): Responsible web caching. In Communications of the ACM, 45 (9) pp. 15-20. https://dl.acm.org/doi/10.1145/567498.567514

Berghel, Hal (2001): Cyberprivacy in the New Millennium. In IEEE Computer, 34 (1) pp. 132-134. https://csdl.computer.org/comp/mags/co/2001/01/r1132abs.htm

Berghel, Hal (2001): A cyberpublishing manifesto. In Communications of the ACM, 44 (3) pp. 17-20. https://dl.acm.org/doi/10.1145/365181.365914

Berghel, Hal (2001): Caustic Cookies. In Communications of the ACM, 44 (5) pp. 19-22. https://dl.acm.org/doi/10.1145/374308.374320

Berghel, Hal (2001): The Y2K e-commerce tumble. In Communications of the ACM, 44 (8) pp. 15-17. https://dl.acm.org/doi/10.1145/381641.381648

Berghel, Hal (2001): The Code Red Worm. In Communications of the ACM, 44 (12) pp. 15-19. https://dl.acm.org/doi/10.1145/501317.501328

Berghel, Hal (2000): Identity Theft, Social Security Numbers, and the Web. In Communications of the ACM, 43 (2) pp. 17-21. https://dl.acm.org/doi/10.1145/328236.328114

Berghel, Hal (2000): Predatory Disintermediation. In Communications of the ACM, 43 (5) pp. 23-29. https://dl.acm.org/doi/10.1145/332833.332850

Berghel, Hal (2000): Digital Politics 2000. In Communications of the ACM, 43 (11) pp. 17-22. https://dl.acm.org/doi/10.1145/353360.353373

Berghel, Hal, Berleant, Daniel, Foy, Thomas, McGuire, Marcus (1999): Cyberbrowsing: Information Customization on the Web. In JASIST - Journal of the American Society for Information Science and Technology, 50 (6) pp. 505-511.

Berghel, Hal (1999): Value-Added Publishing. In Communications of the ACM, 42 (1) pp. 19-23. https://dl.acm.org/doi/10.1145/291469.291487

Berghel, Hal (1999): How Xday Figures in the Y2K Countdown. In Communications of the ACM, 42 (5) pp. 11-15. https://dl.acm.org/doi/10.1145/301353.301388

Berghel, Hal (1999): The Cost of Having Analog Executives in a Digital World. In Communications of the ACM, 42 (11) pp. 11-15. https://dl.acm.org/doi/10.1145/319382.319384

Berghel, Hal (1998): Who Won the Mosaic War?. In Communications of the ACM, 41 (10) pp. 13-16.

Berghel, Hal (1998): The Year-2000 Problem and the New Riddle of Induction. In Communications of the ACM, 41 (3) pp. 13-17.

Berghel, Hal (1997): Cyberspace 2000: Dealing with Information Overload. In Communications of the ACM, 40 (2) pp. 19-24.

Berghel, Hal (1997): Email - The Good, The Bad, and the Ugly. In Communications of the ACM, 40 (4) pp. 11-15.

Berghel, Hal (1997): Informal Logic on Both Sides of the CDA Debate. In Communications of the ACM, 40 (7) pp. 11-15.

Berghel, Hal (1997): Watermarking Cyberspace. In Communications of the ACM, 40 (11) pp. 19-24.

Berghel, Hal, Roach, David (1996): An Extension of Ukkonen's Enhanced Dynamic Programming ASM Algorithm. In ACM Transactions on Information Systems, 14 (1) pp. 94-106. https://www.acm.org/pubs/articles/journals/tois/1996-14-1/p94-berghel/p94-berghel.pdf

Berghel, Hal (1996): The Client\'s Side of the World-Wide Web. In Communications of the ACM, 39 (1) pp. 30-40.

Berghel, Hal (1996): Digital Politics. In Communications of the ACM, 39 (10) pp. 19-25.

Berghel, Hal (1996): HTML Compliance and the Return of the Test Pattern. In Communications of the ACM, 39 (2) pp. 19-22.

Berghel, Hal (1996): U.S. Technology Policy in the Information Age. In Communications of the ACM, 39 (6) pp. 15-18.

Berghel, Hal (1995): Using the WWW Test Pattern to check HTML Client Compliance. In IEEE Computer, 28 (9) pp. 63-65.

Berghel, Hal (1995): Maiden Voyage. In Communications of the ACM, 38 (11) pp. 25-27.

Berghel, Hal (1994): New Wave Prototyping: Use and Abuse of Vacuous Prototypes. In Interactions, 1 (2) pp. 49-54. https://www.acm.org/pubs/articles/journals/interactions/1994-1-2/p49-berghel/p49-berghel.pdf

Dallaire, Gene, Stark, Fortney H., Berghel, Hal (1984): Should Congress Provide Special Tax Incentives for Firms Donating Computers to Schools?. In Communications of the ACM, 27 (3) pp. 185-194.

Berghel, Hal, Roach, David (1990): Documentation Design Based upon Intuitive Feature Taxonomy and Use Logging. In: ACM Eighth International Conference on Systems Documentation , 1990, . pp. 63-68.

Roach, David, Berghel, Hal, Talburt, John R. (1990): An Interactive Source Code Commenter for Prolog Programs. In: ACM Eighth International Conference on Systems Documentation , 1990, . pp. 141-145.

Talburt, John R., Berghel, Hal, Roach, David (1990): RAP: Relocation Allowance Planner, A Rule-Based Expert System with Self-Defining Documenta. In: ACM Eighth International Conference on Systems Documentation , 1990, . pp. 147-150.