12 | -- | 13 | Ronald F. DeMara, Paolo Montuschi. Non-Volatile Memory Trends: Toward Improving Density and Energy Profiles across the System Stack |
16 | -- | 19 | Daniel Prince. Cybersecurity: The Security and Protection Challenges of Our Digital World |
20 | -- | 27 | Sulabh Bhattarai, Yong Wang. End-to-End Trust and Security for Internet of Things Applications |
28 | -- | 38 | Zhen Ni, Qianmu Li, Gang Liu. Game-Model-Based Network Security Risk Control |
40 | -- | 47 | Yongsuk Lee, Gyungho Lee. Detecting Code Reuse Attacks with Branch Prediction |
50 | -- | 59 | Kristofer E. Bouchard, James B. Aimone, Miyoung Chun, Thomas Dean, Michael Denker, Markus Diesmann, David Donofrio, Loren M. Frank, Narayanan Kasthuri, Christof Koch, Oliver RĂ¼bel, Horst D. Simon, Friedrich T. Sommer, Prabhat. International Neuroscience Initiatives through the Lens of High-Performance Computing |
60 | -- | 68 | Konstantin Rubinov, Luciano Baresi. What Are We Missing When Testing Our Android Apps? |
70 | -- | 73 | Hal Berghel. Weaponizing Twitter Litter: Abuse-Forming Networks and Social Media |
74 | -- | 77 | Thomas M. Conte, Erik P. DeBenedictis, Avi Mendelson, Dejan S. Milojicic. Rebooting Computers to Avoid Meltdown and Spectre |
78 | -- | 81 | Mina J. Hanna. Net Neutrality: A Brief Overview of the Policy and the FCC's Ruling to Upend It |
82 | -- | 85 | Chung-Kuan Chen, Zhi-Kai Zhang, Shan-Hsin Lee, Shiuhpyng Shieh. Penetration Testing in the IoT Age |
86 | -- | 89 | Jeffrey M. Voas, Phillip A. Laplante. IoT's Certification Quagmire |
90 | -- | 94 | Jon Rosdahl. Computer Society Standards Drive Industry |