All Stories

  1. In Memoriam: E. Allen Emerson
  2. In Memoriam: Niklaus Wirth
  3. In Memoriam: William A. Wulf
  4. In Memoriam
  5. In memoriam: Juris Hartmanis 1928--2022
  6. Creating a Concept Map for ICS Security – A Delphi Study
  7. In Memoriam: Charles M. Geschke (1939--2021)
  8. Jack Minker (1927---2021)
  9. In Memoriam: Edmund M. Clarke (1945–2020)
  10. Fran Allen
  11. Editorial
  12. The case for disappearing cyber security
  13. Reactive redundancy for data destruction protection (R2D2)
  14. A Hypergame Analysis for ErsatzPasswords
  15. Ghost Patches: Fake Patches for Fake Vulnerabilities
  16. Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords
  17. The strength of encryption
  18. Cyber Security Deception
  19. ErsatzPasswords
  20. Enhancing Passwords Security Using Deceptive Covert Communication
  21. Planning and Integrating Deception into Computer Security Defenses
  22. An Integrated Architecture for Automatic Indication, Avoidance and Profiling of Kernel Rootkit Attacks
  23. Using Deceptive Information in Computer Security Defenses
  24. Editorial
  25. Improved kernel security through memory layout randomization
  26. Editorial
  27. Incentive Alignment and Risk Perception: An Information Security Application
  28. Risks and uncertainties in virtual worlds: an educators’ perspective
  29. Editorial
  30. Back Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication
  31. Cybercrime and Cloud Forensics
  32. Editorial
  33. Reverse-safe authentication protocol for secure USB memories
  34. Editorial
  35. USACM and U.S. legislation
  36. Editorial
  37. Editorial
  38. Editorial for 30/8
  39. Editorial
  40. Implicit Buffer Overflow Protection Using Memory Segregation
  41. Editorial
  42. Security, technology, publishing, and ethics (part II)
  43. Security, technology, publishing, and ethics (Part I)
  44. Editorial
  45. Editorial
  46. Understanding insiders: An analysis of risk-taking behavior
  47. Remembrances of things pest
  48. Audlib: a configurable, high-fidelity application audit mechanism
  49. Privacy and securityAnswering the wrong questions is no answer
  50. USACM's policy role
  51. A distributed requirements management framework for legal compliance and accountability
  52. Assured Information Sharing Life Cycle
  53. Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense
  54. Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
  55. Inspiration and trust
  56. Intrusion Response Systems: A Survey
  57. Run-time label propagation for forensic audit data
  58. COMPUTER SCIENCE: Happy Birthday, Dear Viruses
  59. Automated adaptive intrusion containment in systems of interacting services
  60. CuPIDS: An exploration of highly focused, co-processor-based information system protection
  61. Categories of digital investigation analysis techniques based on the computer history model
  62. On the role of file system metadata in digital forensics
  63. What *is* information security?
  64. Grand challenges in information security: process and output
  65. Information security and the media
  66. PFIRES
  67. Risks of total surveillance
  68. Taking a stand on hackers
  69. Secure outsourcing of scientific computations
  70. Digital government security infrastructure design challenges
  71. Security models for web-based applications
  72. Intrusion detection using autonomous agents
  73. Low-threat security patches and tools
  74. An execution-backtracking approach to debugging
  75. Crisis and aftermath
  76. Understanding Risk and Risk-Taking Behavior in Virtual Worlds
  77. Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach
  78. CuPIDS enhances StUPIDS: exploring a co-processing paradigm shift in information system security
  79. Efficient Intrusion Detection using Automaton Inlining