Journal: IEEE Security & Privacy

Volume 4, Issue 6

3 -- 0George Cybenko. Weak Links, Strong Ties
5 -- 0Eugene H. Spafford. Desert Island Books
6 -- 9Brandi Ortega. News
10 -- 13Gary McGraw. Silver Bullet Speaks with Ed Felten
15 -- 17Simson L. Garfinkel, Michael D. Smith. Guest Editors Introduction: Data Surveillance
18 -- 27Robert Popp, J. C. Poindexter. Countering Terrorism through Information and Privacy Protection Technologies
28 -- 34Jeff Jonas. Threat and Fraud Intelligence, Las Vegas Style
36 -- 43David J. Chaboya, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins. Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion
44 -- 52Vincent C. S. Lee, Linyi Shao. Estimating Potential IT Security Losses: An Alternative Quantitative Approach
53 -- 55Janice Y. Tsai, Serge Egelman. Soups 2006
56 -- 59Bradley S. Rubin, Donald Cheung. Computer Security Education and Research: Handle with Care
60 -- 63Phillip A. Porras. Privacy-Enabled Global Threat Monitoring
64 -- 66John P. Tomaszewski. Are You Sure You Had a Privacy Incident?
67 -- 70Vanessa Gratzer, David Naccache. Cryptography, Law Enforcement, and Mobile Communications
71 -- 73David Ladd. A Software Procurement and Security Primer
74 -- 77Laree Kiely, Terry V. Benzel. Systemic Security Management
78 -- 80William Suchan, Edward Sobiesk. Strengthening the Weakest Link in Digital Protection
81 -- 84Gunnar Peterson, John Steven. Defining Misuse within the Development Process
85 -- 89Peter Mell, Karen Scarfone, Sasha Romanosky. Common Vulnerability Scoring System
96 -- 0Daniel E. Geer Jr.. Evidently Evidentiary