3 | -- | 4 | Shari Lawrence Pfleeger. Expanding to Meet Readers' Needs |
6 | -- | 8 | Gary McGraw. Silver Bullet Talks with Bart Miller |
9 | -- | 12 | Sean Peisert, Jonathan Margulies, David M. Nicol, Himanshu Khurana, Chris Sawall. Designed-in Security for Cyber-Physical Systems |
13 | -- | 15 | Bill G. Horne. On Computer Security Incident Response Teams |
16 | -- | 26 | Robin Ruefle, Audrey J. Dorofee, David A. Mundie, Allen D. Householder, Michael Murray, Samuel J. Perl. Computer Security Incident Response Team Development and Evolution |
27 | -- | 34 | Kas Clark, Don Stikvoort, Eelco Stofbergen, Elly van den Heuvel. A Dutch Approach to Cybersecurity through Participation |
35 | -- | 41 | Sandeep Bhatt, Pratyusa K. Manadhata, Loai Zomlot. The Operational Role of Security Information and Event Management Systems |
42 | -- | 51 | Panos Kampanakis. Security Automation and Threat Information-Sharing Options |
52 | -- | 60 | Sathya Chandran Sundaramurthy, John McHugh, Xinming Simon Ou, S. Raj Rajagopalan, Michael Wesch. An Anthropological Approach to Studying CSIRTs |
61 | -- | 67 | Tiffani R. Chen, Daniel B. Shore, Stephen J. Zaccaro, Reeshad S. Dalal, Lois E. Tetrick, Aiva K. Gorab. An Organizational Psychology Perspective to Examining Computer Security Incident Response Teams |
68 | -- | 77 | Yossi Gilad, Amir Herzberg, Haya Shulman. Off-Path Hacking: The Illusion of Challenge-Response Authentication |
78 | -- | 81 | Katrine Evans. Where in the World Is My Information?: Giving People Access to Their Data |
82 | -- | 85 | Cuong Manh Pham, Zachary Estrada, Phuong Cao, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer. Building Reliable and Secure Virtual Machines Using Architectural Invariants |
86 | -- | 89 | Jeffrey K. MacKie-Mason. Can We Afford Privacy from Surveillance? |
90 | -- | 93 | Aaron Beuhring, Kyle Salous. Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats |
96 | -- | 0 | Bruce Schneier. The Future of Incident Response |