5 | -- | 0 | Diane Crawford. Editorial pointers |
9 | -- | 10 | . News track |
11 | -- | 13 | Diane Crawford. Forum |
15 | -- | 18 | Rebecca Mercuri. Superscaled security |
21 | -- | 24 | Phillip G. Armour. Beware of counting LOC |
25 | -- | 27 | Michael A. Cusumano. Who is liable for bugs and security flaws in software? |
29 | -- | 31 | John G. Messerly. How computer games affect CS (and other) students' school performance |
32 | -- | 35 | John Yen. Introduction to the special issue on emerging technologies for homeland security |
36 | -- | 43 | Robert Popp, Thomas Armour, Ted Senator, Kristen Numrych. Countering terrorism through information technology |
45 | -- | 47 | Thayne Coffman, Seth Greenblatt, Sherry Marcus. Graph-based technologies for intelligence analysis |
48 | -- | 50 | Paul A. Kogut, John Yen, Yui Leung, Shuang Sun, Rui Wang, Ted Mielczarek, Ben Hellar. Proactive information gathering for homeland security teams |
52 | -- | 57 | O. Sami Saydjari. Cyber defense: art to science |
58 | -- | 61 | Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu. Cyber defense technology networking and evaluation |
62 | -- | 65 | Steve Sawyer, Andrea Tapia, Leonard Pesheck, John Davenport. Mobility and the first responder |
66 | -- | 68 | Robin R. Murphy. Rescue robotics for homeland security |
70 | -- | 76 | Gang Wang, Hsinchun Chen, Homa Atabakhsh. Automatically detecting deceptive criminal identities |
77 | -- | 82 | Alberto Escudero-Pascual, Ian Hosein. Questioning lawful access to traffic data |
83 | -- | 87 | Nikunj P. Dalal, Manjunath Kamath, William J. Kolarik, Eswar Sivaraman. Toward an integrated framework for modeling enterprise processes |
89 | -- | 94 | Luigi Suardi. How to manage your software product life cycle with MAUI |
95 | -- | 98 | Eyong B. Kim, Marc J. Schniederjans. The role of personality in Web-based distance education courses |
99 | -- | 102 | Vikram Sethi, Ruth C. King, James Campbell Quick. What causes stress in information system professionals? |
120 | -- | 0 | Mark Stamp. Risks of monoculture |