Abstract is missing.
- Conducting an Ethical Study of Web TrafficJohn F. Duncan, L. Jean Camp. [doi]
- Students Who Don't Understand Information Flow Should Be Eaten: An Experience PaperRoya Ensafi, Mike Jacobi, Jedidiah R. Crandall. [doi]
- Collaborative Red Teaming for Anonymity System EvaluationSandy Clark, Chris Wacek, Matt Blaze, Boon Thau Loo, Micah Sherr, Clay Shields, Jonathan M. Smith. [doi]
- Virtual Machine Introspection in a Hybrid Honeypot ArchitectureTamas K. Lengyel, Justin Neumann, Steve Maresca, Bryan D. Payne, Aggelos Kiayias. [doi]
- Methodically Modeling the Tor NetworkRob Jansen, Kevin S. Bauer, Nicholas Hopper, Roger Dingledine. [doi]
- Do Malware Reports Expedite Cleanup? An Experimental StudyMarie Vasek, Tyler Moore. [doi]
- Beyond Disk Imaging for Preserving User State in Network TestbedsJelena Mirkovic, Abdulla Alwabel, Ted Faber. [doi]
- Towards a Framework for Evaluating BGP SecurityOlaf Maennel, Iain Phillips, Debbie Perouli, Randy Bush, Rob Austein, Askar Jaboldinov. [doi]
- Disturbed Playing: Another Kind of Educational Security GamesSebastian Koch, Joerg Schneider, Jan Nordholz. [doi]
- Analyzing Resiliency of the Smart Grid Communication Architectures under Cyber AttackAnas AlMajali, Arun Viswanathan, Clifford Neuman. [doi]
- Learning from Early Attempts to Measure Information Security PerformanceJing Zhang, Robin Berthier, Will Rhee, Michael Bailey, Partha Pal, Farnam Jahanian, William H. Sanders. [doi]
- A Secure Architecture for the Range-Level Command and Control System of a National Cyber Range TestbedMichael Rosenstein, Frank Corvese. [doi]