Journal: IEEE Security & Privacy

Volume 7, Issue 1

3 -- 0Marc Donner. Reading (with) the Enemy
5 -- 6Brandi Ortega. Shaking Up the Cybersecurity Landscape
7 -- 11Gary McGraw. Silver Bullet Talks with Gunnar Peterson
12 -- 13Jaynarayan H. Lala, Fred B. Schneider. IT Monoculture Security Risks and Defenses
14 -- 17Kenneth P. Birman, Fred B. Schneider. The Monoculture Risk Put into Context
18 -- 25Angelos D. Keromytis. Randomized Instruction Sets and Runtime Environments Past Research and Future Directions
26 -- 33Daniel Williams, Wei Hu, Jack W. Davidson, Jason Hiser, John C. Knight, Anh Nguyen-Tuong. Security through Diversity: Leveraging Virtual Machine Technology
34 -- 41Kjell Jørgen Hole, André N. Klingsheim, Lars-Helge Netland, Yngve Espelid, Thomas Tjøstheim, Vebjørn Moen. Risk Assessment of a National Security Infrastructure
42 -- 48Michel Cukier, Susmit Panjwani. Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities
50 -- 57William Enck, Machigar Ongtang, Patrick Drew McDaniel. Understanding Android Security
58 -- 62Susan Landau. The NRC Takes on Data Mining, Behavioral Surveillance, and Privacy
63 -- 67Bret Michael, Jeffrey M. Voas, Phillip A. Laplante. Cyberpandemics: History, Inevitability, Response
68 -- 71Yuen-Yan Chan, Victor K.-W. Wei. Teaching for Conceptual Change in Security Awareness: A Case Study in Higher Education
72 -- 76Patricia Kosseim, Khaled El Emam. Privacy Interests in Prescription Data, Part I: Prescriber Privacy
78 -- 81Franco Callegati, Walter Cerroni, Marco Ramilli. Man-in-the-Middle Attack to the HTTPS Protocol
82 -- 85Phillip A. Porras. Directions in Network-Based Security Monitoring
86 -- 87Daniel E. Geer Jr., Daniel G. Conway. The 0wned Price Index
88 -- 0Bruce Schneier. Architecture of Privacy