2 | -- | 3 | J. Morris Chang. New Trends in Cybersecurity |
4 | -- | 7 | Richard P. Guidorizzi. Security: Active Authentication |
8 | -- | 11 | Patrick Juola, John Noecker Jr., Ariel Stolerman, Michael Ryan, Patrick Brennan, Rachel Greenstadt. Keyboard-Behavior-Based Authentication |
12 | -- | 15 | Ingo Deutschmann, Peder Nordstrom, Linus Nilsson. Continuous Authentication Using Behavioral Biometrics |
16 | -- | 19 | Jenifer Wheeler, Denise Varner, John Carrola, Christopher Dahlberg, Thomas Thornton, Corey Bohil, Kelly Terry. Covert Cognitive Games and User Response Patterns |
20 | -- | 23 | Abdul Serwadda, Zibo Wang, Patrick Koch, Sathya Govindarajan, Raviteja Pokala, Adam Goodkind, David-Guy Brizan, Andrew Rosenberg, Vir V. Phoha, Kiran S. Balagani. Scan-Based Evaluation of Continuous Keystroke Authentication Systems |
24 | -- | 28 | J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei Yuan Wu, Yixiao Ding, Chris Chu, Stephen Gilbert, Ahmed E. Kamal, Sun-Yuan Kung. Capturing Cognitive Fingerprints from Keystroke Dynamics |
29 | -- | 33 | Alex Fridman, Ariel Stolerman, Sayandeep Acharya, Patrick Brennan, Patrick Juola, Rachel Greenstadt, Moshe Kam. Decision Fusion for Multimodal Active Authentication |
34 | -- | 37 | Jeffery Payne, Mark Fenner, Jonathan Kauffman. System Event Monitoring for Active Authentication |
38 | -- | 42 | Vishal M. Patel, Tom Yeh, Mohammed E. Fathy, Yangmuzi Zhang, Yan Chen, Rama Chellappa, Larry S. Davis. Screen Fingerprints: A Novel Modality for Active Authentication |
44 | -- | 49 | Kelce S. Wilson. Conflicts Among the Pillars of Information Assurance |
50 | -- | 56 | Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu. Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs |
57 | -- | 59 | Keith W. Miller. A Secret Sociotechnical System |
60 | -- | 61 | Linda Wilbanks. Changing Jobs, Part III: Starting a New Job |
64 | -- | 0 | Tom Costello. Random Thoughts for CIOs |