Journal: IEEE Security & Privacy

Volume 12, Issue 5

3 -- 4Shari Lawrence Pfleeger. Expanding to Meet Readers' Needs
6 -- 8Gary McGraw. Silver Bullet Talks with Bart Miller
9 -- 12Sean Peisert, Jonathan Margulies, David M. Nicol, Himanshu Khurana, Chris Sawall. Designed-in Security for Cyber-Physical Systems
13 -- 15Bill G. Horne. On Computer Security Incident Response Teams
16 -- 26Robin Ruefle, Audrey J. Dorofee, David A. Mundie, Allen D. Householder, Michael Murray, Samuel J. Perl. Computer Security Incident Response Team Development and Evolution
27 -- 34Kas Clark, Don Stikvoort, Eelco Stofbergen, Elly van den Heuvel. A Dutch Approach to Cybersecurity through Participation
35 -- 41Sandeep Bhatt, Pratyusa K. Manadhata, Loai Zomlot. The Operational Role of Security Information and Event Management Systems
42 -- 51Panos Kampanakis. Security Automation and Threat Information-Sharing Options
52 -- 60Sathya Chandran Sundaramurthy, John McHugh, Xinming Simon Ou, S. Raj Rajagopalan, Michael Wesch. An Anthropological Approach to Studying CSIRTs
61 -- 67Tiffani R. Chen, Daniel B. Shore, Stephen J. Zaccaro, Reeshad S. Dalal, Lois E. Tetrick, Aiva K. Gorab. An Organizational Psychology Perspective to Examining Computer Security Incident Response Teams
68 -- 77Yossi Gilad, Amir Herzberg, Haya Shulman. Off-Path Hacking: The Illusion of Challenge-Response Authentication
78 -- 81Katrine Evans. Where in the World Is My Information?: Giving People Access to Their Data
82 -- 85Cuong Manh Pham, Zachary Estrada, Phuong Cao, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer. Building Reliable and Secure Virtual Machines Using Architectural Invariants
86 -- 89Jeffrey K. MacKie-Mason. Can We Afford Privacy from Surveillance?
90 -- 93Aaron Beuhring, Kyle Salous. Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats
96 -- 0Bruce Schneier. The Future of Incident Response