3 | -- | 0 | Marc Donner. Reading (with) the Enemy |
5 | -- | 6 | Brandi Ortega. Shaking Up the Cybersecurity Landscape |
7 | -- | 11 | Gary McGraw. Silver Bullet Talks with Gunnar Peterson |
12 | -- | 13 | Jaynarayan H. Lala, Fred B. Schneider. IT Monoculture Security Risks and Defenses |
14 | -- | 17 | Kenneth P. Birman, Fred B. Schneider. The Monoculture Risk Put into Context |
18 | -- | 25 | Angelos D. Keromytis. Randomized Instruction Sets and Runtime Environments Past Research and Future Directions |
26 | -- | 33 | Daniel Williams, Wei Hu, Jack W. Davidson, Jason Hiser, John C. Knight, Anh Nguyen-Tuong. Security through Diversity: Leveraging Virtual Machine Technology |
34 | -- | 41 | Kjell Jørgen Hole, André N. Klingsheim, Lars-Helge Netland, Yngve Espelid, Thomas Tjøstheim, Vebjørn Moen. Risk Assessment of a National Security Infrastructure |
42 | -- | 48 | Michel Cukier, Susmit Panjwani. Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities |
50 | -- | 57 | William Enck, Machigar Ongtang, Patrick Drew McDaniel. Understanding Android Security |
58 | -- | 62 | Susan Landau. The NRC Takes on Data Mining, Behavioral Surveillance, and Privacy |
63 | -- | 67 | Bret Michael, Jeffrey M. Voas, Phillip A. Laplante. Cyberpandemics: History, Inevitability, Response |
68 | -- | 71 | Yuen-Yan Chan, Victor K.-W. Wei. Teaching for Conceptual Change in Security Awareness: A Case Study in Higher Education |
72 | -- | 76 | Patricia Kosseim, Khaled El Emam. Privacy Interests in Prescription Data, Part I: Prescriber Privacy |
78 | -- | 81 | Franco Callegati, Walter Cerroni, Marco Ramilli. Man-in-the-Middle Attack to the HTTPS Protocol |
82 | -- | 85 | Phillip A. Porras. Directions in Network-Based Security Monitoring |
86 | -- | 87 | Daniel E. Geer Jr., Daniel G. Conway. The 0wned Price Index |
88 | -- | 0 | Bruce Schneier. Architecture of Privacy |