Journal: IEEE Computer

Volume 45, Issue 12

6 -- 9John W. Walz. Implementing SP7: A Review of Progress in 2012
10 -- 12Charles Severance. Vint Cerf: A Brief History of Packets
13 -- 15Brian M. Gaff, Timothy P. Van Dyck, Elizabeth A. Peters. Employment Issues Confronting Start-Up Companies
18 -- 21Lee Garber. Have Java's Security Issues Gotten out of Hand?
25 -- 27Gary C. Kessler. Advancing the Science of Digital Forensics
28 -- 35Joel Young, Kristina Foster, Simson Garfinkel, Kevin D. Fairbanks. Distinct Sector Hashes for Target File Detection
36 -- 43Ray Hunt, Sherali Zeadally. Network Forensics: An Analysis of Techniques, Tools, and Trends
44 -- 51Irfan Ahmed, Sebastian Obermeier, Martin Naedele, Golden G. Richard III. SCADA Systems: Challenges for Forensic Investigators
52 -- 58Yong Wang, Kevin Streff, Sonell Raman. Smartphone Security Challenges
60 -- 64Aaron Spear, Markus Levy, Mathieu Desnoyers. Using Tracing to Solve the Multicore System Debug Problem
65 -- 72Rafael Moreno-Vozmediano, Rubén S. Montero, Ignacio Martín Llorente. IaaS Cloud Architecture: From Virtualized Datacenters to Federated Cloud Infrastructures
73 -- 75Naren Sundaravaradan, Naren Ramakrishnan, David A. Hanauer. Factorizing Event Sequences
76 -- 79Manfred Lau, Jun Mitani, Takeo Igarashi. Digital Fabrication
80 -- 83Arnold Brown, Benjamin Apple, James Bret Michael, Michael Schumann. Atomic-Level Security for Web Applications in a Cloud Environment
84 -- 87Emil Vassev, Mike Hinchey. Awareness in Software-Intensive Systems
90 -- 92Brad Hallisey. Building a Virtual World: The Pipeline and Process
116 -- 0David Alan Grier, Erin Dian Dumbacher. Work/Play