4 | -- | 6 | Paul C. van Oorschot. Untangling Security and Privacy |
8 | -- | 15 | Fariborz Farahmand. Quantitative Issues in Cyberinsurance: Lessons From Behavioral Economics, Counterfactuals, and Causal Inference |
16 | -- | 22 | Domhnall Carlin, Jonah Burgess, Philip O'Kane, Sakir Sezer. You Could Be Mine(d): The Rise of Cryptojacking |
23 | -- | 34 | Luca Allodi, Tzouliano Chotza, Ekaterina Panina, Nicola Zannone. The Need for New Antiphishing Measures Against Spear-Phishing Attacks |
35 | -- | 45 | Boubakr Nour, Kashif Sharif, Fan Li 0001, Yu Wang 0003. Security and Privacy Challenges in Information-Centric Wireless Internet of Things Networks |
46 | -- | 55 | Markus Jakobsson. Permissions and Privacy |
56 | -- | 60 | Patrick Jauernig, Ahmad-Reza Sadeghi, Emmanuel Stapf. Trusted Execution Environments: Properties, Applications, and Challenges |
61 | -- | 66 | Thomas R. Souvignet, Thibaut Heckmann, Timothy Bollé. From Lucky Luke to Lock Bits |
68 | -- | 74 | Denny Pencheva, Joseph Hallett, Awais Rashid. Bringing Cyber to School: Integrating Cybersecurity Into Secondary School Education |
76 | -- | 0 | Steven M. Bellovin. Policies on Privacy |