All Stories

  1. In Memoriam: C.A.R. Hoare
  2. In Memoriam: Vicki L. Hanson
  3. In Memoriam: David J. Farber
  4. In Memoriam: E. Allen Emerson
  5. In Memoriam: Niklaus Wirth
  6. In Memoriam: William A. Wulf
  7. In Memoriam
  8. In memoriam: Juris Hartmanis 1928--2022
  9. Creating a Concept Map for ICS Security – A Delphi Study
  10. In Memoriam: Charles M. Geschke (1939--2021)
  11. Jack Minker (1927---2021)
  12. In Memoriam: Edmund M. Clarke (1945–2020)
  13. In Memoriam: Ronald E. Anderson, 1941-2020
  14. Fran Allen
  15. Editorial
  16. The case for disappearing cyber security
  17. Reactive redundancy for data destruction protection (R2D2)
  18. A Hypergame Analysis for ErsatzPasswords
  19. Ghost Patches: Fake Patches for Fake Vulnerabilities
  20. Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords
  21. The strength of encryption
  22. Cyber Security Deception
  23. ErsatzPasswords
  24. Enhancing Passwords Security Using Deceptive Covert Communication
  25. Planning and Integrating Deception into Computer Security Defenses
  26. An Integrated Architecture for Automatic Indication, Avoidance and Profiling of Kernel Rootkit Attacks
  27. Using Deceptive Information in Computer Security Defenses
  28. Editorial
  29. Improved kernel security through memory layout randomization
  30. Editorial
  31. Incentive Alignment and Risk Perception: An Information Security Application
  32. Risks and uncertainties in virtual worlds: an educators’ perspective
  33. Editorial
  34. Back Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication
  35. Cybercrime and Cloud Forensics
  36. Editorial
  37. Reverse-safe authentication protocol for secure USB memories
  38. Editorial
  39. USACM and U.S. legislation
  40. Editorial
  41. Editorial
  42. Editorial for 30/8
  43. Editorial
  44. Implicit Buffer Overflow Protection Using Memory Segregation
  45. Editorial
  46. Security, technology, publishing, and ethics (part II)
  47. Security, technology, publishing, and ethics (Part I)
  48. Editorial
  49. Editorial
  50. Understanding insiders: An analysis of risk-taking behavior
  51. Remembrances of things pest
  52. Audlib: a configurable, high-fidelity application audit mechanism
  53. Privacy and securityAnswering the wrong questions is no answer
  54. USACM's policy role
  55. A distributed requirements management framework for legal compliance and accountability
  56. Assured Information Sharing Life Cycle
  57. Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense
  58. Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
  59. Inspiration and trust
  60. Intrusion Response Systems: A Survey
  61. Run-time label propagation for forensic audit data
  62. COMPUTER SCIENCE: Happy Birthday, Dear Viruses
  63. Automated adaptive intrusion containment in systems of interacting services
  64. CuPIDS: An exploration of highly focused, co-processor-based information system protection
  65. Categories of digital investigation analysis techniques based on the computer history model
  66. On the role of file system metadata in digital forensics
  67. What *is* information security?
  68. Grand challenges in information security: process and output
  69. Information security and the media
  70. PFIRES
  71. Risks of total surveillance
  72. Taking a stand on hackers
  73. Secure outsourcing of scientific computations
  74. Digital government security infrastructure design challenges
  75. Security models for web-based applications
  76. Intrusion detection using autonomous agents
  77. Low-threat security patches and tools
  78. An execution-backtracking approach to debugging
  79. Crisis and aftermath
  80. Understanding Risk and Risk-Taking Behavior in Virtual Worlds
  81. Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach
  82. CuPIDS enhances StUPIDS: exploring a co-processing paradigm shift in information system security
  83. Efficient Intrusion Detection using Automaton Inlining