Journal: IEEE Computer

Volume 49, Issue 3

5 -- 0Leila De Floriani. Using 2D Maps for 3D Localization
10 -- 13Ying-Dar Lin, Jeffrey M. Voas, Antonio Pescapè, Peter Mueller. Communications and Privacy under Surveillance
14 -- 24Steven M. Bellovin, Matt Blaze, Susan Landau 0001. Insecure Surveillance: Technical Issues with Remote Computer Searches
25 -- 33Steven J. Murdoch. Insecure by Design: Protocols for Encrypted Phone Calls
34 -- 40Stephen Farrell. Requirements Analysis Required-Otherwise Targeted Monitoring Enables Pervasive Monitoring
42 -- 49Robert Koch 0002, Mario Golling, Gabi Dreo Rodosek. How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation
50 -- 55Hassan Metwalley, Stefano Traverso, Marco Mellia. Using Passive Measurements to Demystify Online Trackers
56 -- 63Imran Yusof, Al-Sakib Khan Pathan. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
64 -- 72Amit P. Sheth, Pramod Anantharam, Cory A. Henson. Semantic, Cognitive, and Perceptual Computing: Paradigms That Shape Human Experience
73 -- 77Hal Berghel. Net Neutrality vs. Net Neutering
78 -- 81Shams Zawoad, Ragib Hasan. Trustworthy Digital Forensics in the Cloud
82 -- 87Robert N. Charette. The STEM Anxiety Business
88 -- 91Charlene Chuck Walrad. The IEEE Computer Society and ACM's Collaboration on Computing Education
92 -- 96Karen Bartleson. Practical Insights from the Peculiar World of Standards
96 -- 99Gaurav Misra, Jose M. Such. How Socially Aware Are Social Media Privacy Controls?
100 -- 103Greg Byrd. Immortal Bits: Managing Our Digital Legacies
104 -- 107Angelos Stavrou, Daniel Fleck, Constantinos Kolias. On the Move: Evading Distributed Denial-of-Service Attacks
128 -- 0David Alan Grier. Go, Stop, Go, Stop