Abstract is missing.
- Detecting Roles and Anomalies in Hospital Access Audit LogsCarl A. Gunter. 1 [doi]
- Security Analysis of the Chinese Web: How well is it protected?Ping Chen, Nick Nikiforakis, Lieven Desmet, Christophe Huygens. 3-9 [doi]
- Improving Efficiency of Spam Detection using Economic ModelFida Gillani, Ehab Al-Shaer. 11-18 [doi]
- Secure and Tamper Proof Code ManagementJeremy Tate, T. Charles Clancy. 19-24 [doi]
- Enterprise Risk Assessment Based on Compliance Reports and Vulnerability Scoring SystemsMohammed Noraden Alsaleh, Ehab Al-Shaer. 25-28 [doi]
- Protecting Enterprise Networks through Attack Surface ExpansionKun Sun, Sushil Jajodia. 29-32 [doi]
- n-ROPdetector: Proposal of a Method to Detect the ROP Attack Code on the NetworkYasuyuki Tanaka, Atsuhiro Goto. 33-36 [doi]
- Human Factors, Defaults, and Automation: Challenges and OpporunitiesLujo Bauer. 37 [doi]