Abstract is missing.
- Cent, five cent, ten cent, dollar: hitting botnets where it ::::really:::: hurtsRichard Ford, Sarah Gordon. 3-10 [doi]
- Dark application communitiesMichael E. Locasto, Angelos Stavrou, Angelos D. Keromytis. 11-18 [doi]
- Challenging the anomaly detection paradigm: a provocative discussionCarrie Gates, Carol Taylor. 21-29 [doi]
- Inconsistency in deception for defenseVicentiu Neagoe, Matt Bishop. 31-38 [doi]
- Sanitization models and their limitationsRick Crawford, Matt Bishop, Bhume Bhumiratana, Lisa Clark, Karl N. Levitt. 41-56 [doi]
- Large-scale collection and sanitization of network security data: risks and challengesPhillip A. Porras, Vitaly Shmatikov. 57-64 [doi]
- Googling considered harmfulGregory J. Conti. 67-76 [doi]
- A pact with the devilMike Bond, George Danezis. 77-82 [doi]
- E-Prime for security: a new security paradigmSteven J. Greenwald. 87-95 [doi]
- Diffusion and graph spectral methods for network forensic analysisWei Wang, Thomas E. Daniels. 99-106 [doi]
- PKI design for the real worldPeter Gutmann. 109-116 [doi]