7 | -- | 10 | Erich J. Neuhold. 50 & 25 Years Ago |
8 | -- | 0 | Ergun Akleman. Computing Through Time: Security |
11 | -- | 13 | Jeffrey M. Voas. Mockery, Fake Reviews, and Fake Reviewers |
12 | -- | 0 | Jeffrey M. Voas. In this Issue |
14 | -- | 25 | W. Eric Wong, Jeffrey M. Voas. Revisiting Software Reliability Modeling and Testing |
26 | -- | 35 | Carson Koball, Yong Wang, Bhaskar prasad Rimal, Varghese Mathew Vaidyan. Machine Learning Security: Threat Model, Attacks, and Challenges |
36 | -- | 44 | Anton Dimov Hristozov. Engineering Challenges for Developing Reliable and Secure Heterogeneous Computing Systems |
45 | -- | 55 | Mohammed Amine Boudouaia, Samir Ouchani. Designing Secure and Smart Supply Chains: A Roadmap |
56 | -- | 65 | Maciej Rys. Unraveling Participation Motivations in Pandemic-Related Hackathons: A COVID-19 Study |
66 | -- | 74 | Bilal Naqvi, Kari Smolander. Practitioners' Perspectives on and Prospects for Usable Security |
76 | -- | 81 | Theresa Fister, George K. Thiruvathukal. Artificial Intelligence Employment Interviews: Examining Limitations, Biases, and Perceptions |
82 | -- | 85 | Christian Koch 0009. The Prisoner's Dilemma of Open-Source Software Security |
86 | -- | 89 | Andreas GrĂ¼nert, James Bret Michael, Rolf Oppliger, Ruedi Rytz. Why Probabilities Cannot Be Used in Cyber Risk Management |
90 | -- | 92 | Joanna F. DeFranco. Health Care 4.0 and Clinical Internet of Things |
94 | -- | 98 | George F. Hurlburt. Artificial Intelligence, the Workforce and Educational Realities |
99 | -- | 103 | Umang Bhatt, Holli Sargeant. When Should Algorithms Resign? A Proposal for AI Governance |
104 | -- | 111 | Kevin Macwan. Integrating Blockchain Technology in Online Gaming Ecosystems |
112 | -- | 117 | Nir Kshetri. Navigating EU Regulations: Challenges for U.S. Technology Firms and the Rise of Europe's Generative AI Ecosystem |
118 | -- | 130 | Matthew Litton, Doron Drusinsky, London Bridget, James Bret Michael. Machine-Learned Correctness Properties, Runtime Verification, and Advance-Warning Oracles for Autonomous Systems |
131 | -- | 137 | Hal Berghel. Election Integrity in the United States: How Will 2024 Compare to 2020? |
138 | -- | 143 | Mengjia Yan 0001, Thomas Bourgeat, Sharad Malik. Formal Verification for Secure Processors: A Guide for Computer Architects |
144 | -- | 150 | Christof Ebert, Ulrich Hemel. Grow Your Artificial Intelligence Competence |
151 | -- | 158 | Jyotika Athavale, Cullen E. Bash, Wesley Brewer, Matthias Maiterth, Dejan S. Milojicic, Harry Petty, Soumyendu Sarkar. Digital Twins for Data Centers |
160 | -- | 164 | Nicholas Soures, Jayanta Dey, Dhireesha Kudithipudi. Learning Continually in Silicon |