Publications
Co-authors
Productive Colleagues
Publications
Berghel, Hal (2008): Faith-based security. In Communications of the ACM, 51 (4) pp. 13-17. https://dl.acm.org/doi/10.1145/1330311.1330315
Berghel, Hal (2008): BRAP forensics. In Communications of the ACM, 51 (6) pp. 15-20. https://dl.acm.org/doi/10.1145/1349026.1349030
Berghel, Hal (2007): Hiding data, forensics, and anti-forensics. In Communications of the ACM, 50 (4) pp. 15-20. https://dl.acm.org/doi/10.1145/1232743.1232761
Berghel, Hal (2007): Credit Card Forensics. In Communications of the ACM, 50 (12) pp. 11-14. https://dl.acm.org/doi/10.1145/1323688.1323708
Berghel, Hal (2006): Phishing mongers and posers. In Communications of the ACM, 49 (4) pp. 21-25. https://dl.acm.org/doi/10.1145/1121949.1121968
Berghel, Hal, Hoelzer, David (2006): Disk wiping by any other name. In Communications of the ACM, 49 (8) pp. 17-21. https://dl.acm.org/doi/10.1145/1145303
Berghel, Hal (2006): Fungible credentials and next-generation fraud. In Communications of the ACM, 49 (12) pp. 15-19. https://dl.acm.org/doi/10.1145/1183252
Berghel, Hal (2005): The two sides of ROI: return on investment vs. risk of incarceration. In Communications of the ACM, 48 (4) pp. 15-20. https://dl.acm.org/doi/10.1145/1053291.1053305
Berghel, Hal, Hoelzer, David (2005): Pernicious ports. In Communications of the ACM, 48 (12) pp. 23-30. https://dl.acm.org/doi/10.1145/1101779.1101798
Berghel, Hal, Uecker, Jacob (2005): WiFi attack vectors. In Communications of the ACM, 48 (8) pp. 21-28. https://dl.acm.org/doi/10.1145/1076211.1076229
Berghel, Hal (2004): Wireless infidelity I: war driving. In Communications of the ACM, 47 (9) pp. 21-26. https://dl.acm.org/doi/10.1145/1015864.1015879
Berghel, Hal, Brajkovska, Natasa (2004): Wading into alternate data streams. In Communications of the ACM, 47 (4) pp. 21-27. https://dl.acm.org/doi/10.1145/975817.975836
Berghel, Hal, Sallach, David L. (2004): A paradigm shift in computing and IT education. In Communications of the ACM, 47 (6) pp. 83-88. https://dl.acm.org/doi/10.1145/990680.990685
Berghel, Hal, Uecker, Jacob (2004): Wireless infidelity II: airjacking. In Communications of the ACM, 47 (12) pp. 15-20. https://dl.acm.org/doi/10.1145/1035134.1035149
Berghel, Hal (2003): The discipline of Internet forensics. In Communications of the ACM, 46 (8) pp. 15-20. https://dl.acm.org/doi/10.1145/859670.859687
Berghel, Hal (2003): Malware month. In Communications of the ACM, 46 (12) pp. 15-19. https://dl.acm.org/doi/10.1145/953460.953476
Berghel, Hal, Womack, Kim (2003): Anonymizing the net. In Communications of the ACM, 46 (4) pp. 15-20. https://dl.acm.org/doi/10.1145/641205.641220
Berghel, Hal (2002): Hijacking the web. In Communications of the ACM, 45 (4) pp. 23-27. https://dl.acm.org/doi/10.1145/505248.505263
Berghel, Hal (2002): Responsible web caching. In Communications of the ACM, 45 (9) pp. 15-20. https://dl.acm.org/doi/10.1145/567498.567514
Berghel, Hal (2001): Cyberprivacy in the New Millennium. In IEEE Computer, 34 (1) pp. 132-134. https://csdl.computer.org/comp/mags/co/2001/01/r1132abs.htm
Berghel, Hal (2001): A cyberpublishing manifesto. In Communications of the ACM, 44 (3) pp. 17-20. https://dl.acm.org/doi/10.1145/365181.365914
Berghel, Hal (2001): Caustic Cookies. In Communications of the ACM, 44 (5) pp. 19-22. https://dl.acm.org/doi/10.1145/374308.374320
Berghel, Hal (2001): The Y2K e-commerce tumble. In Communications of the ACM, 44 (8) pp. 15-17. https://dl.acm.org/doi/10.1145/381641.381648
Berghel, Hal (2001): The Code Red Worm. In Communications of the ACM, 44 (12) pp. 15-19. https://dl.acm.org/doi/10.1145/501317.501328
Berghel, Hal (2000): Identity Theft, Social Security Numbers, and the Web. In Communications of the ACM, 43 (2) pp. 17-21. https://dl.acm.org/doi/10.1145/328236.328114
Berghel, Hal (2000): Predatory Disintermediation. In Communications of the ACM, 43 (5) pp. 23-29. https://dl.acm.org/doi/10.1145/332833.332850
Berghel, Hal (2000): Digital Politics 2000. In Communications of the ACM, 43 (11) pp. 17-22. https://dl.acm.org/doi/10.1145/353360.353373
Berghel, Hal, Berleant, Daniel, Foy, Thomas, McGuire, Marcus (1999): Cyberbrowsing: Information Customization on the Web. In JASIST - Journal of the American Society for Information Science and Technology, 50 (6) pp. 505-511.
Berghel, Hal (1999): Value-Added Publishing. In Communications of the ACM, 42 (1) pp. 19-23. https://dl.acm.org/doi/10.1145/291469.291487
Berghel, Hal (1999): How Xday Figures in the Y2K Countdown. In Communications of the ACM, 42 (5) pp. 11-15. https://dl.acm.org/doi/10.1145/301353.301388
Berghel, Hal (1999): The Cost of Having Analog Executives in a Digital World. In Communications of the ACM, 42 (11) pp. 11-15. https://dl.acm.org/doi/10.1145/319382.319384
Berghel, Hal (1998): Who Won the Mosaic War?. In Communications of the ACM, 41 (10) pp. 13-16.
Berghel, Hal (1998): The Year-2000 Problem and the New Riddle of Induction. In Communications of the ACM, 41 (3) pp. 13-17.
Berghel, Hal (1997): Cyberspace 2000: Dealing with Information Overload. In Communications of the ACM, 40 (2) pp. 19-24.
Berghel, Hal (1997): Email - The Good, The Bad, and the Ugly. In Communications of the ACM, 40 (4) pp. 11-15.
Berghel, Hal (1997): Informal Logic on Both Sides of the CDA Debate. In Communications of the ACM, 40 (7) pp. 11-15.
Berghel, Hal (1997): Watermarking Cyberspace. In Communications of the ACM, 40 (11) pp. 19-24.
Berghel, Hal, Roach, David (1996): An Extension of Ukkonen's Enhanced Dynamic Programming ASM Algorithm. In ACM Transactions on Information Systems, 14 (1) pp. 94-106. https://www.acm.org/pubs/articles/journals/tois/1996-14-1/p94-berghel/p94-berghel.pdf
Berghel, Hal (1996): The Client\'s Side of the World-Wide Web. In Communications of the ACM, 39 (1) pp. 30-40.
Berghel, Hal (1996): Digital Politics. In Communications of the ACM, 39 (10) pp. 19-25.
Berghel, Hal (1996): HTML Compliance and the Return of the Test Pattern. In Communications of the ACM, 39 (2) pp. 19-22.
Berghel, Hal (1996): U.S. Technology Policy in the Information Age. In Communications of the ACM, 39 (6) pp. 15-18.
Berghel, Hal (1995): Using the WWW Test Pattern to check HTML Client Compliance. In IEEE Computer, 28 (9) pp. 63-65.
Berghel, Hal (1995): Maiden Voyage. In Communications of the ACM, 38 (11) pp. 25-27.
Berghel, Hal (1994): New Wave Prototyping: Use and Abuse of Vacuous Prototypes. In Interactions, 1 (2) pp. 49-54. https://www.acm.org/pubs/articles/journals/interactions/1994-1-2/p49-berghel/p49-berghel.pdf
Dallaire, Gene, Stark, Fortney H., Berghel, Hal (1984): Should Congress Provide Special Tax Incentives for Firms Donating Computers to Schools?. In Communications of the ACM, 27 (3) pp. 185-194.
Berghel, Hal, Roach, David (1990): Documentation Design Based upon Intuitive Feature Taxonomy and Use Logging. In: ACM Eighth International Conference on Systems Documentation , 1990, . pp. 63-68.
Roach, David, Berghel, Hal, Talburt, John R. (1990): An Interactive Source Code Commenter for Prolog Programs. In: ACM Eighth International Conference on Systems Documentation , 1990, . pp. 141-145.
Talburt, John R., Berghel, Hal, Roach, David (1990): RAP: Relocation Allowance Planner, A Rule-Based Expert System with Self-Defining Documenta. In: ACM Eighth International Conference on Systems Documentation , 1990, . pp. 147-150.