Journal: IEEE Computer

Volume 48, Issue 4

6 -- 0David Forsyth. Representation Learning
7 -- 9Brian M. Gaff. Important IP Cases in 2015, Part One
12 -- 14D. Frank Hsu, Dorothy Marinucci, Jeffrey M. Voas. Cybersecurity: Toward a Secure and Sustainable Cyber Ecosystem
16 -- 25Ruby B. Lee. Rethinking Computers for Cybersecurity
26 -- 34David Gillman, Yin Lin, Bruce M. Maggs, Ramesh K. Sitaraman. Protecting Websites from Attack with Secure Delivery Networks
36 -- 44Kristin E. Heckman, Frank J. Stech, Ben S. Schmoker, Roshan K. Thomas. Denial and Deception in Cyber Defense
45 -- 55Tomas Vagoun, George O. Strawn. Implementing the Federal Cybersecurity R&D Strategy
56 -- 63Sek Chai. Enabling Smart Camera Networks with Smartphone Processors
64 -- 72Jon D. Hagar, Thomas L. Wissink, D. Richard Kuhn, Raghu Kacker. Introducing Combinatorial Testing in a Large Organization
74 -- 77Greg Byrd. A Little Ingenuity Solves an Elephant-Sized Problem
78 -- 81Emily Shen, Mayank Varia, Robert K. Cunningham, W. Konrad Vesey. Cryptographically Secure Computation
82 -- 86Hal Berghel. Borderline Executive Disorder
104 -- 0David Alan Grier. Accidents Will Happen