6 | -- | 9 | John W. Walz. Implementing SP7: A Review of Progress in 2012 |
10 | -- | 12 | Charles Severance. Vint Cerf: A Brief History of Packets |
13 | -- | 15 | Brian M. Gaff, Timothy P. Van Dyck, Elizabeth A. Peters. Employment Issues Confronting Start-Up Companies |
18 | -- | 21 | Lee Garber. Have Java's Security Issues Gotten out of Hand? |
25 | -- | 27 | Gary C. Kessler. Advancing the Science of Digital Forensics |
28 | -- | 35 | Joel Young, Kristina Foster, Simson Garfinkel, Kevin D. Fairbanks. Distinct Sector Hashes for Target File Detection |
36 | -- | 43 | Ray Hunt, Sherali Zeadally. Network Forensics: An Analysis of Techniques, Tools, and Trends |
44 | -- | 51 | Irfan Ahmed, Sebastian Obermeier, Martin Naedele, Golden G. Richard III. SCADA Systems: Challenges for Forensic Investigators |
52 | -- | 58 | Yong Wang, Kevin Streff, Sonell Raman. Smartphone Security Challenges |
60 | -- | 64 | Aaron Spear, Markus Levy, Mathieu Desnoyers. Using Tracing to Solve the Multicore System Debug Problem |
65 | -- | 72 | Rafael Moreno-Vozmediano, Rubén S. Montero, Ignacio Martín Llorente. IaaS Cloud Architecture: From Virtualized Datacenters to Federated Cloud Infrastructures |
73 | -- | 75 | Naren Sundaravaradan, Naren Ramakrishnan, David A. Hanauer. Factorizing Event Sequences |
76 | -- | 79 | Manfred Lau, Jun Mitani, Takeo Igarashi. Digital Fabrication |
80 | -- | 83 | Arnold Brown, Benjamin Apple, James Bret Michael, Michael Schumann. Atomic-Level Security for Web Applications in a Cloud Environment |
84 | -- | 87 | Emil Vassev, Mike Hinchey. Awareness in Software-Intensive Systems |
90 | -- | 92 | Brad Hallisey. Building a Virtual World: The Pipeline and Process |
116 | -- | 0 | David Alan Grier, Erin Dian Dumbacher. Work/Play |