3 | -- | 0 | George Cybenko. Weak Links, Strong Ties |
5 | -- | 0 | Eugene H. Spafford. Desert Island Books |
6 | -- | 9 | Brandi Ortega. News |
10 | -- | 13 | Gary McGraw. Silver Bullet Speaks with Ed Felten |
15 | -- | 17 | Simson L. Garfinkel, Michael D. Smith. Guest Editors Introduction: Data Surveillance |
18 | -- | 27 | Robert Popp, J. C. Poindexter. Countering Terrorism through Information and Privacy Protection Technologies |
28 | -- | 34 | Jeff Jonas. Threat and Fraud Intelligence, Las Vegas Style |
36 | -- | 43 | David J. Chaboya, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins. Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion |
44 | -- | 52 | Vincent C. S. Lee, Linyi Shao. Estimating Potential IT Security Losses: An Alternative Quantitative Approach |
53 | -- | 55 | Janice Y. Tsai, Serge Egelman. Soups 2006 |
56 | -- | 59 | Bradley S. Rubin, Donald Cheung. Computer Security Education and Research: Handle with Care |
60 | -- | 63 | Phillip A. Porras. Privacy-Enabled Global Threat Monitoring |
64 | -- | 66 | John P. Tomaszewski. Are You Sure You Had a Privacy Incident? |
67 | -- | 70 | Vanessa Gratzer, David Naccache. Cryptography, Law Enforcement, and Mobile Communications |
71 | -- | 73 | David Ladd. A Software Procurement and Security Primer |
74 | -- | 77 | Laree Kiely, Terry V. Benzel. Systemic Security Management |
78 | -- | 80 | William Suchan, Edward Sobiesk. Strengthening the Weakest Link in Digital Protection |
81 | -- | 84 | Gunnar Peterson, John Steven. Defining Misuse within the Development Process |
85 | -- | 89 | Peter Mell, Karen Scarfone, Sasha Romanosky. Common Vulnerability Scoring System |
96 | -- | 0 | Daniel E. Geer Jr.. Evidently Evidentiary |