3 | -- | 0 | Fred B. Schneider. Labeling-in Security |
5 | -- | 7 | Gary McGraw. Silver Bullet Talks with Fred Schneider |
8 | -- | 9 | James Figueroa. News Briefs |
10 | -- | 13 | Shari Lawrence Pfleeger, Salvatore J. Stolfo. Addressing the Insider Threat |
14 | -- | 21 | Deanna Caputo, Marcus A. Maloof, Gregory D. Stephens. Detecting Insider Theft of Trade Secrets |
22 | -- | 29 | Brian M. Bowen, Malek Ben Salem, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo. Designing Host and Network Sensors to Mitigate the Insider Threat |
30 | -- | 38 | Felicia Duran, Stephen H. Conrad, Gregory N. Conrad, David P. Duggan, Edward Bruce Held. Building A System For Insider Security |
39 | -- | 45 | Saar Drimer, Steven J. Murdoch, Ross J. Anderson. Failures of Tamper-Proofing in PIN Entry Devices |
46 | -- | 53 | Eric A. Bier, Richard Chow, Philippe Golle, Tracy Holloway King, Jessica Staddon. The Rules of Redaction: Identify, Protect, Review (and Repeat) |
54 | -- | 56 | Bruce Potter. High Time for Trusted Computing |
57 | -- | 59 | Adam Goldstein, David Bucciero. The Dartmouth Cyber Security Initiative: Faculty, Staff, and Students Work Together |
60 | -- | 64 | O. Sami Saydjari, Cynthia E. Irvine. A Tale of Three Cyber-Defense Workshops |
69 | -- | 71 | Richard Ford, William H. Allen. Malware Shall Greatly Increase ... |
72 | -- | 76 | Franco Callegati, Marco Ramilli. Frightened by Links |
77 | -- | 81 | Michael E. Locasto, Sergey Bratus, Brian Schulte. Bickering In-Depth: Rethinking the Composition of Competing Security Systems |
82 | -- | 85 | Alessandro Acquisti. Nudging Privacy: The Behavioral Economics of Personal Information |
86 | -- | 87 | Daniel E. Geer Jr., Daniel G. Conway. Patch Grief with Proverbs |
88 | -- | 0 | Daniel E. Geer Jr.. Deskilling Digital Security |