Abstract is missing.
- The Impact of Immediate Disclosure on Attack Diffusion and VolumeSam Ransbotham, Sabyasachi Mitra. 1-12 [doi]
- Where Do All the Attacks Go?Dinei Florêncio, Cormac Herley. 13-33 [doi]
- Sex, Lies and Cyber-Crime SurveysDinei Florêncio, Cormac Herley. 35-53 [doi]
- The Underground Economy of Fake Antivirus SoftwareBrett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald, Giovanni Vigna. 55-78 [doi]
- The Inconvenient Truth About Web CertificatesNevena Vratonjic, Julien Freudiger, Vincent Bindschaedler, Jean-Pierre Hubaux. 79-117 [doi]
- Resilience of the Internet Interconnection EcosystemChris Hall, Ross J. Anderson, Richard Clayton, Evangelos Ouzounis, Panagiotis Trimintzios. 119-148 [doi]
- Modeling Internet-Scale Policies for Cleaning up MalwareSteven A. Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards, George Stelle. 149-170 [doi]
- Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security: A Utility-theoretic ApproachChristos Ioannidis, David J. Pym, Julian Williams. 171-191 [doi]
- Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security?Brent Rowe, Dallas Wood. 193-212 [doi]
- Economic Methods and Decision Making by Security ProfessionalsAdrian Baldwin, Yolanta Beres, Geoffrey B. Duggan, Marco Casassa Mont, Hilary Johnson, Chris Middup, Simon Shiu. 213-238 [doi]
- Real Name Verification Law on the Internet: A Poison or Cure for Privacy?Daegon Cho. 239-261 [doi]
- The Privacy Landscape: Product Differentiation on Data CollectionSören Preibusch, Joseph Bonneau. 263-283 [doi]