4 | -- | 7 | Sean Peisert. Isolating Insecurely: A Call to Arms for the Security and Privacy Community During the Time of COVID-19 |
8 | -- | 19 | Hamed Okhravi, Nathan Burow, Richard Skowyra, Bryan C. Ward, Samuel Jero, Roger Kazan, Howard E. Shrobe. One Giant Leap for Computer Security |
20 | -- | 27 | Marietheres Dietz, Günther Pernul. Unleashing the Digital Twin's Potential for ICS Security |
28 | -- | 37 | L. Jean Camp, Ryan Henry, Tadayoshi Kohno, Shrirang Mare, Steven A. Myers, Shwetak N. Patel, Joshua Streiff. Toward a Secure Internet of Things: Directions for Research |
38 | -- | 47 | Behnood Momenzadeh, Helen Dougherty, Matthew Remmel, Steven A. Myers, L. Jean Camp. Best Practices Would Make Things Better in the IoT |
48 | -- | 54 | Inger Anne Tøndel, Martin Gilje Jaatun, Daniela Soares Cruzes. IT Security Is From Mars, Software Security Is From Venus |
56 | -- | 59 | Khaled El Emam. Seven Ways to Evaluate the Utility of Synthetic Data |
60 | -- | 66 | Dan Shoemaker 0001, Nancy R. Mead, Anne Kohnke. Teaching Secure Acquisition in Higher Education |
67 | -- | 70 | Eric Osterweil. A Cybersecurity Terminarch: Use It Before We Lose It |
72 | -- | 74 | Holger Mack, Tom Schroer. Security Midlife Crisis: Building Security in a New World |
75 | -- | 76 | Daniel E. Geer Jr.. Security Theater, the Beat Goes On |