3 | -- | 5 | Shari Lawrence Pfleeger. Technology, Transparency, and Trust |
9 | -- | 12 | Gary McGraw. Silver Bullet Talks with the IEEE Center for Secure Design |
13 | -- | 14 | Sean Peisert, Jonathan Margulies. Closing the Gap on Securing Energy Sector Control Systems [Guest editors' introduction] |
15 | -- | 23 | Carlos Barreto, Jairo Alonso Giraldo, Alvaro A. Cárdenas, Eduardo Mojica-Nava, Nicanor Quijano. Control Systems for the Power Grid and Their Resiliency to Attacks |
24 | -- | 31 | Moses Schwartz, John Mulder, Adrian R. Chavez, Benjamin A. Allan. Emerging Techniques for Field Device Security |
32 | -- | 39 | Chuck McParland, Sean Peisert, Anna Scaglione. Monitoring Security of Networked Control Systems: It's the Physics |
40 | -- | 47 | Saman A. Zonouz, Julian L. Rrushi, Stephen E. McLaughlin. Detecting Industrial Control Malware Using Automated PLC Code Analytics |
48 | -- | 54 | Ryan Ellis. Regulating Cybersecurity: Institutional Learning or a Lesson in Futility? |
55 | -- | 58 | Sean Peisert, Jonathan Margulies, Eric Byres, Paul Dorey, Dale Peterson, Zach Tudor. Control Systems Security from the Front Lines |
59 | -- | 66 | Francien Dechesne, Dina Hadziosmanovic, Wolter Pieters. Experimenting with Incentives: Security in Pilots for Future Grids |
68 | -- | 74 | Jungwoo Ryoo, Syed Rizvi, William Aiken, John Kissell. Cloud Security Auditing: Challenges and Emerging Approaches |
75 | -- | 78 | Frank Kargl, Rens Wouter van der Heijden, Hartmut König, Alfonso Valdes, Marc Dacier. Insights on the Security and Dependability of Industrial Control Systems |
79 | -- | 83 | Melissa Dark. Advancing Cybersecurity Education |
84 | -- | 88 | Wendy M. Grossman. "Emergency" Ushers in a New Era in British Communications Surveillance |
89 | -- | 93 | Lorrie Faith Cranor, Norbou Buchler. Better Together: Usability and Security Go Hand in Hand |
94 | -- | 96 | Michael Lesk. Trust, but Verify |
97 | -- | 101 | Todd Bauer, Jason Hamlet. Physical Unclonable Functions: A Primer |
102 | -- | 107 | Benjamin Edelman. Accountable? The Problems and Solutions of Online Ad Optimization |
108 | -- | 0 | Steven M. Bellovin. What Should Crypto Look Like? |