We have met the enemy and he is us (DOI)
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, Carrie Gates
Localization of credential information to address increasingly inevitable data breaches (DOI)
Mohammad Mannan, P. C. van Oorschot
ROFL: routing as the firewall layer (DOI)
Hang Zhao, Chi-Kin Chau, Steven M. Bellovin
The user is not the enemy: fighting malware by tracking user intentions (DOI)
Jeffrey Shirley, David Evans
The compliance budget: managing security behaviour in organisations (DOI)
Adam Beautement, M. Angela Sasse, Mike Wonham
A profitless endeavor: phishing as tragedy of the commons (DOI)
Cormac Herley, Dinei FlorĂȘncio
Security compliance: the next frontier in security research (DOI)
Klaus Julisch
Towards an ethical code for information security? (DOI)
Steven J. Greenwald, Brian D. Snow, Richard Ford, Richard Thieme
The developer is the enemy (DOI)
Glenn Wurster, P. C. van Oorschot
The ecology of Malware (DOI)
Jedidiah R. Crandall, Roya Ensafi, Stephanie Forrest, Joshua Ladau, Bilal Shebaro
Trading in risk: using markets to improve access control (DOI)
Ian Molloy, Pau-Chen Cheng, Pankaj Rohatgi
Choose the red pill and the blue pill: a position paper (DOI)
Ben Laurie, Abe Singer