Journal: IEEE Computer

Volume 49, Issue 6

8 -- 9Mohamed Ibrahim, Krishnendu Chakrabarty. Digital-Microfluidic Biochips
11 -- 14Elisa Bertino. Security Threats: Protecting the New Cyberfrontier
15 -- 21Daniel Vecchiato, Marco Vieira, Eliane Martins. The Perils of Android Security Configuration
22 -- 30David Kotz, Carl A. Gunter, Santosh Kumar, Jonathan P. Weiner. Privacy and Security in Mobile Health: A Research Agenda
31 -- 37Ronald Prescott Loui, Terrence D. Loui. How to Survive a Cyber Pearl Harbor
38 -- 46V. S. Subrahmanian, Amos Azaria, Skylar Durst, Vadim Kagan, Aram Galstyan, Kristina Lerman, Linhong Zhu, Emilio Ferrara, Alessandro Flammini, Filippo Menczer. The DARPA Twitter Bot Challenge
48 -- 55Tsong Yueh Chen, Fei-Ching Kuo, Wenjuan Ma, Willy Susilo, Dave Towey, Jeffrey Voas, Zhi Quan Zhou. Metamorphic Testing for Cybersecurity
56 -- 64Qingpeng Zhang, Daniel Dajun Zeng, Fei-Yue Wang, Ronald L. Breiger, James A. Hendler. Brokers or Bridges? Exploring Structural Holes in a Crowdsourcing System
66 -- 74Qiuming Luo, Feng Xiao, Zhong Ming, Hao Li, Jianyong Chen, Jianhua Zhang. Optimizing the Memory Management of a Virtual Machine Monitor on a NUMA System
77 -- 79Sorel Reisman, Eli Shmueli. Opening the Instructional Doors to Computer Science and IT-Finally
80 -- 83Jeffrey Voas. Demystifying the Internet of Things
84 -- 87Erik P. DeBenedictis. Rebooting Computers as Learning Machines
88 -- 92Daniel Ullrich, Andreas Butz. Social Robots for the 21st Century
95 -- 97Brian David Johnson. Science Fiction and the Coming Age of Sentient Tools
98 -- 102Kateryna Netkachova, Robin E. Bloomfield. Security-Informed Safety
120 -- 0David Alan Grier. Scientific Conversations