All Stories

  1. In Memoriam: E. Allen Emerson
  2. The case for disappearing cyber security
  3. Reactive redundancy for data destruction protection (R2D2)
  4. A Hypergame Analysis for ErsatzPasswords
  5. The strength of encryption
  6. Improved kernel security through memory layout randomization
  7. Editorial
  8. Incentive Alignment and Risk Perception: An Information Security Application
  9. Risks and uncertainties in virtual worlds: an educators’ perspective
  10. Editorial
  11. Back Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication
  12. Cybercrime and Cloud Forensics
  13. Reverse-safe authentication protocol for secure USB memories
  14. USACM and U.S. legislation
  15. Editorial
  16. Editorial for 30/8
  17. Editorial
  18. Implicit Buffer Overflow Protection Using Memory Segregation
  19. Editorial
  20. Security, technology, publishing, and ethics (part II)
  21. Security, technology, publishing, and ethics (Part I)
  22. Editorial
  23. Editorial
  24. Understanding insiders: An analysis of risk-taking behavior
  25. Remembrances of things pest
  26. Audlib: a configurable, high-fidelity application audit mechanism
  27. Privacy and securityAnswering the wrong questions is no answer
  28. USACM's policy role
  29. A distributed requirements management framework for legal compliance and accountability
  30. Assured Information Sharing Life Cycle
  31. Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense
  32. Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
  33. Inspiration and trust
  34. Intrusion Response Systems: A Survey
  35. Run-time label propagation for forensic audit data
  36. COMPUTER SCIENCE: Happy Birthday, Dear Viruses
  37. Automated adaptive intrusion containment in systems of interacting services
  38. CuPIDS: An exploration of highly focused, co-processor-based information system protection
  39. Categories of digital investigation analysis techniques based on the computer history model
  40. On the role of file system metadata in digital forensics
  41. What *is* information security?
  42. Grand challenges in information security: process and output
  43. Information security and the media
  44. PFIRES
  45. Risks of total surveillance
  46. Taking a stand on hackers
  47. Secure outsourcing of scientific computations
  48. Digital government security infrastructure design challenges
  49. Security models for web-based applications
  50. Intrusion detection using autonomous agents
  51. An execution-backtracking approach to debugging
  52. Crisis and aftermath
  53. Understanding Risk and Risk-Taking Behavior in Virtual Worlds
  54. Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach
  55. CuPIDS enhances StUPIDS: exploring a co-processing paradigm shift in information system security
  56. Efficient Intrusion Detection using Automaton Inlining