6 | -- | 0 | David Forsyth. Representation Learning |
7 | -- | 9 | Brian M. Gaff. Important IP Cases in 2015, Part One |
12 | -- | 14 | D. Frank Hsu, Dorothy Marinucci, Jeffrey M. Voas. Cybersecurity: Toward a Secure and Sustainable Cyber Ecosystem |
16 | -- | 25 | Ruby B. Lee. Rethinking Computers for Cybersecurity |
26 | -- | 34 | David Gillman, Yin Lin, Bruce M. Maggs, Ramesh K. Sitaraman. Protecting Websites from Attack with Secure Delivery Networks |
36 | -- | 44 | Kristin E. Heckman, Frank J. Stech, Ben S. Schmoker, Roshan K. Thomas. Denial and Deception in Cyber Defense |
45 | -- | 55 | Tomas Vagoun, George O. Strawn. Implementing the Federal Cybersecurity R&D Strategy |
56 | -- | 63 | Sek Chai. Enabling Smart Camera Networks with Smartphone Processors |
64 | -- | 72 | Jon D. Hagar, Thomas L. Wissink, D. Richard Kuhn, Raghu Kacker. Introducing Combinatorial Testing in a Large Organization |
74 | -- | 77 | Greg Byrd. A Little Ingenuity Solves an Elephant-Sized Problem |
78 | -- | 81 | Emily Shen, Mayank Varia, Robert K. Cunningham, W. Konrad Vesey. Cryptographically Secure Computation |
82 | -- | 86 | Hal Berghel. Borderline Executive Disorder |
104 | -- | 0 | David Alan Grier. Accidents Will Happen |