Abstract is missing.
- A Theoretical Analysis: Physical Unclonable Functions and the Software Protection ProblemRishab Nithyanand, John Solis. 1-11 [doi]
- A Method for Preventing "Skipping" AttacksMarc Joye. 12-15 [doi]
- Side-Channel Analysis of Grøstl and SkeinChristina Boura, Sylvain Lévêque, David Vigilant. 16-26 [doi]
- The BlueJay Ultra-Lightweight Hybrid CryptosystemMarkku-Juhani O. Saarinen. 27-32 [doi]
- Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring MatchingMehrdad Majzoobi, Masoud Rostami, Farinaz Koushanfar, Dan S. Wallach, Srinivas Devadas. 33-44 [doi]
- Privacy in Online Review SitesMatthew Burkholder, Rachel Greenstadt. 45-52 [doi]
- Policy Aware Social MinerSharon Paradesi, Oshani Seneviratne, Lalana Kagal. 53-59 [doi]
- Semantic Comparison of Security Policies: From Access Control Policies to Flow PropertiesMathieu Jaume. 60-67 [doi]
- A Framework for Modeling Decision Making and Deception with Semantic InformationChristopher Griffin, Kathleen Moore. 68-74 [doi]
- A Knowledge-Based Approach to Intrusion Detection ModelingSumit More, Mary Matthews, Anupam Joshi, Tim Finin. 75-81 [doi]
- Privacy Control in Smart Phones Using Semantically Rich Reasoning and Context ModelingDibyajyoti Ghosh, Anupam Joshi, Tim Finin, Pramod Jagtap. 82-85 [doi]
- Implementing Mental ModelsJim Blythe, L. Jean Camp. 86-90 [doi]
- Towards a Semantics of PhishHilarie Orman. 91-96 [doi]
- Bridging the Semantic Gap to Mitigate Kernel-Level KeyloggersJesús Navarro, Enrique Naudon, Daniela Oliveira. 97-103 [doi]
- User Intention-Based Traffic Dependence Analysis for Anomaly DetectionHao Zhang, William Banick, Danfeng Yao, Naren Ramakrishnan. 104-112 [doi]
- Toward a Game Theoretic Model of Information Release in Social Media with Experimental ResultsChristopher Griffin, Anna Cinzia Squicciarini. 113-116 [doi]
- Using Consensus Clustering for Multi-view Anomaly DetectionAlexander Liu, Dung N. Lam. 117-124 [doi]
- Fog Computing: Mitigating Insider Data Theft Attacks in the CloudSalvatore J. Stolfo, Malek Ben Salem, Angelos D. Keromytis. 125-128 [doi]
- Lost in Translation: Improving Decoy Documents via Automated TranslationJonathan Voris, Nathaniel Boggs, Salvatore J. Stolfo. 129-133 [doi]
- Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor NetworksYoungho Cho, Gang Qu, Yuanming Wu. 134-141 [doi]
- Proactive Insider Threat Detection through Graph Learning and Psychological ContextOliver Brdiczka, Juan Liu, Bob Price, Jianqiang Shen, Akshay Patil, Richard Chow, Eugene Bart, Nicolas Ducheneaut. 142-149 [doi]
- Forensic Methods for Detecting Insider Turning BehaviorsFred Cohen. 150-158 [doi]
- Decision Support Procedure in the Insider Threat DomainJohn P. Murphy, Vincent H. Berk, Ian D. Gregorio-De Souza. 159-163 [doi]