All Stories

  1. In Memoriam: Vicki L. Hanson
  2. In Memoriam: David J. Farber
  3. In Memoriam: E. Allen Emerson
  4. In Memoriam: Niklaus Wirth
  5. In Memoriam: William A. Wulf
  6. In Memoriam
  7. In memoriam: Juris Hartmanis 1928--2022
  8. Creating a Concept Map for ICS Security – A Delphi Study
  9. In Memoriam: Charles M. Geschke (1939--2021)
  10. Jack Minker (1927---2021)
  11. In Memoriam: Edmund M. Clarke (1945–2020)
  12. In Memoriam: Ronald E. Anderson, 1941-2020
  13. Fran Allen
  14. Editorial
  15. The case for disappearing cyber security
  16. Reactive redundancy for data destruction protection (R2D2)
  17. A Hypergame Analysis for ErsatzPasswords
  18. Ghost Patches: Fake Patches for Fake Vulnerabilities
  19. Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords
  20. The strength of encryption
  21. Cyber Security Deception
  22. ErsatzPasswords
  23. Enhancing Passwords Security Using Deceptive Covert Communication
  24. Planning and Integrating Deception into Computer Security Defenses
  25. An Integrated Architecture for Automatic Indication, Avoidance and Profiling of Kernel Rootkit Attacks
  26. Using Deceptive Information in Computer Security Defenses
  27. Editorial
  28. Improved kernel security through memory layout randomization
  29. Editorial
  30. Incentive Alignment and Risk Perception: An Information Security Application
  31. Risks and uncertainties in virtual worlds: an educators’ perspective
  32. Editorial
  33. Back Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication
  34. Cybercrime and Cloud Forensics
  35. Editorial
  36. Reverse-safe authentication protocol for secure USB memories
  37. Editorial
  38. USACM and U.S. legislation
  39. Editorial
  40. Editorial
  41. Editorial for 30/8
  42. Editorial
  43. Implicit Buffer Overflow Protection Using Memory Segregation
  44. Editorial
  45. Security, technology, publishing, and ethics (part II)
  46. Security, technology, publishing, and ethics (Part I)
  47. Editorial
  48. Editorial
  49. Understanding insiders: An analysis of risk-taking behavior
  50. Remembrances of things pest
  51. Audlib: a configurable, high-fidelity application audit mechanism
  52. Privacy and securityAnswering the wrong questions is no answer
  53. USACM's policy role
  54. A distributed requirements management framework for legal compliance and accountability
  55. Assured Information Sharing Life Cycle
  56. Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense
  57. Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
  58. Inspiration and trust
  59. Intrusion Response Systems: A Survey
  60. Run-time label propagation for forensic audit data
  61. COMPUTER SCIENCE: Happy Birthday, Dear Viruses
  62. Automated adaptive intrusion containment in systems of interacting services
  63. CuPIDS: An exploration of highly focused, co-processor-based information system protection
  64. Categories of digital investigation analysis techniques based on the computer history model
  65. On the role of file system metadata in digital forensics
  66. What *is* information security?
  67. Grand challenges in information security: process and output
  68. Information security and the media
  69. PFIRES
  70. Risks of total surveillance
  71. Taking a stand on hackers
  72. Secure outsourcing of scientific computations
  73. Digital government security infrastructure design challenges
  74. Security models for web-based applications
  75. Intrusion detection using autonomous agents
  76. Low-threat security patches and tools
  77. An execution-backtracking approach to debugging
  78. Crisis and aftermath
  79. Understanding Risk and Risk-Taking Behavior in Virtual Worlds
  80. Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach
  81. CuPIDS enhances StUPIDS: exploring a co-processing paradigm shift in information system security
  82. Efficient Intrusion Detection using Automaton Inlining