Maximizing Power Grid Security
Security and Privacy
Developer Ecosystems for Software Safety
Perspectives on AI from Around the Globe
In Memoriam: Ross Anderson, 1956-2024
The Risks of Source Code Breaches
The Return of Age Verification Laws
Device Onboarding Using FDO and the Untrusted Installer Model
The Science of Detecting LLM-Generated Text
Indistinguishability Obfuscation from Well-Founded Assumptions
Technical Perspective: Hiding Secrets in Programs
Disinformation 2.0 in the Age of AI: A Cybersecurity Perspective
Internet of Things Security and Privacy Labels Should Empower Consumers
Validating Factual Personal Information
Unlocking the Potential of Zero-Knowledge Proofs in Blockchain
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More