Abstract is missing.
- Exploring the Usability of Open Source Network Forensic ToolsErik E. Northrop, Heather Richter Lipford. 1-8 [doi]
- ACH Walkthrough: A Distributed Multi-Device Tool for Collaborative Security AnalysisJeff Wilson, Judith M. Brown, Robert Biddle. 9-16 [doi]
- Interactive Code Annotation for Security Vulnerability DetectionHeather Richter Lipford, Tyler Thomas, Bill Chu, Emerson R. Murphy-Hill. 17-22 [doi]
- Technical and Personal Factors Influencing Developers' Adoption of Security ToolsJim Witschey, Shundan Xiao, Emerson R. Murphy-Hill. 23-26 [doi]
- Comparative Evaluation of Architectural and Code-Level Approaches for Finding Security VulnerabilitiesRadu Vanciu, Ebrahim Khalaj, Marwan Abi-Antoun. 27-34 [doi]
- Designing Interventions to Persuade Software Developers to Adopt Security ToolsTiffany Brooke Jordan, Brittany Johnson, Jim Witschey, Emerson R. Murphy-Hill. 35-38 [doi]
- Human-Centered Study of a Network Operations Center: Experience Report and Lessons LearnedCeleste Lyn Paul. 39-42 [doi]
- A Tale of Three Security Operation CentersSathya Chandran Sundaramurthy, Jacob Case, Tony Truong, Loai Zomlot, Marcel Hoffmann. 43-50 [doi]
- An Exploratory Study of White Hat Behaviors in a Web Vulnerability Disclosure ProgramMingyi Zhao, Jens Grossklags, Kai Chen. 51-58 [doi]