All Stories

  1. The case for disappearing cyber security
  2. Reactive redundancy for data destruction protection (R2D2)
  3. A Hypergame Analysis for ErsatzPasswords
  4. The strength of encryption
  5. Improved kernel security through memory layout randomization
  6. Editorial
  7. Incentive Alignment and Risk Perception: An Information Security Application
  8. Risks and uncertainties in virtual worlds: an educators’ perspective
  9. Editorial
  10. Back Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication
  11. Cybercrime and Cloud Forensics
  12. Reverse-safe authentication protocol for secure USB memories
  13. USACM and U.S. legislation
  14. Editorial
  15. Editorial for 30/8
  16. Editorial
  17. Implicit Buffer Overflow Protection Using Memory Segregation
  18. Editorial
  19. Security, technology, publishing, and ethics (part II)
  20. Security, technology, publishing, and ethics (Part I)
  21. Editorial
  22. Editorial
  23. Understanding insiders: An analysis of risk-taking behavior
  24. Remembrances of things pest
  25. Audlib: a configurable, high-fidelity application audit mechanism
  26. Privacy and securityAnswering the wrong questions is no answer
  27. USACM's policy role
  28. A distributed requirements management framework for legal compliance and accountability
  29. Assured Information Sharing Life Cycle
  30. Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense
  31. Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
  32. Inspiration and trust
  33. Intrusion Response Systems: A Survey
  34. Run-time label propagation for forensic audit data
  35. COMPUTER SCIENCE: Happy Birthday, Dear Viruses
  36. Automated adaptive intrusion containment in systems of interacting services
  37. CuPIDS: An exploration of highly focused, co-processor-based information system protection
  38. Categories of digital investigation analysis techniques based on the computer history model
  39. On the role of file system metadata in digital forensics
  40. What *is* information security?
  41. Grand challenges in information security: process and output
  42. Information security and the media
  43. PFIRES
  44. Risks of total surveillance
  45. Taking a stand on hackers
  46. Secure outsourcing of scientific computations
  47. Digital government security infrastructure design challenges
  48. Security models for web-based applications
  49. Intrusion detection using autonomous agents
  50. An execution-backtracking approach to debugging
  51. Crisis and aftermath
  52. Understanding Risk and Risk-Taking Behavior in Virtual Worlds
  53. Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach
  54. CuPIDS enhances StUPIDS: exploring a co-processing paradigm shift in information system security
  55. Efficient Intrusion Detection using Automaton Inlining