Abstract is missing.
- Why is there no science in cyber science?: a panel discussion at NSPW 2010Roy A. Maxion, Thomas A. Longstaff, John McHugh. 1-6 [doi]
- E unibus pluram: massive-scale software diversity as a defense mechanismMichael Franz. 7-16 [doi]
- On information flow for intrusion detection: what if accurate full-system dynamic information flow tracking was possible?Mohammed I. Al-Saleh, Jedidiah R. Crandall. 17-32 [doi]
- A stealth approach to usable security: helping IT security managers to identify workable security solutionsSimon E. Parkin, Aad P. A. van Moorsel, Philip Inglesant, Martina Angela Sasse. 33-50 [doi]
- VM-based security overkill: a lament for applied systems security researchSergey Bratus, Michael E. Locasto, Ashwin Ramaswamy, Sean W. Smith. 51-60 [doi]
- A billion keys, but few locks: the crisis of web single sign-onSan-Tsai Sun, Yazan Boshmaf, Kirstie Hawkey, Konstantin Beznosov. 61-72 [doi]
- To boldly go where invention isn't secure: applying security entrepreneurship to secure systems designShamal Faily, Ivan Flechais. 73-84 [doi]
- Would a 'cyber warrior' protect us: exploring trade-offs between attack and defense of information systemsTyler Moore, Allan Friedman, Ariel D. Procaccia. 85-94 [doi]
- On-line privacy and consent: a dialogue, not a monologueLizzie Coles-Kemp, Elahe Kani-Zabihi. 95-106 [doi]
- A risk management process for consumers: the next step in information securityAndré van Cleeff. 107-114 [doi]
- Ontological semantic technology for detecting insider threat and social engineeringVictor Raskin, Julia M. Taylor, Christian Hempelmann. 115-128 [doi]
- The pervasive trust foundation for security in next generation networksLeszek Lilien, Adawia Al-Alawneh, Lotfi Ben Othmane. 129-142 [doi]
- This is your data on drugs: lessons computer security can learn from the drug warDavid Molnar, Serge Egelman, Nicolas Christin. 143-149 [doi]
- Relationships and data sanitization: a study in scarletMatt Bishop, Justin Cummins, Sean Peisert, Anhad Singh, Bhume Bhumiratana, Deborah A. Agarwal, Deborah A. Frincke, Michael Hogarth. 151-164 [doi]