Mohammed I. Al-Saleh, Jedidiah R. Crandall.
On information flow for intrusion detection: what if accurate full-system dynamic information flow tracking was possible?.
Matt Bishop, Justin Cummins, Sean Peisert, Anhad Singh, Bhume Bhumiratana, Deborah Agarwal, Deborah Frincke, Michael Hogarth.
Relationships and data sanitization: a study in scarlet.
Sergey Bratus, Michael E. Locasto, Ashwin Ramaswamy, Sean W. Smith.
VM-based security overkill: a lament for applied systems security research.
Lizzie Coles-Kemp, Elahe Kani-Zabihi.
On-line privacy and consent: a dialogue, not a monologue.
Shamal Faily, Ivan Flechais.
To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design.
Leszek Lilien, Adawia Al-Alawneh, Lotfi Ben Othmane.
The pervasive trust foundation for security in next generation networks.
Roy A. Maxion, Thomas A. Longstaff, John McHugh.
Why is there no science in cyber science?: a panel discussion at NSPW 2010.
David Molnar, Serge Egelman, Nicolas Christin.
This is your data on drugs: lessons computer security can learn from the drug war.
Tyler Moore, Allan Friedman, Ariel D. Procaccia.
Would a 'cyber warrior' protect us: exploring trade-offs between attack and defense of information systems.
Simon Parkin, Aad van Moorsel, Philip Inglesant, M. Angela Sasse.
A stealth approach to usable security: helping IT security managers to identify workable security solutions.
Victor Raskin, Julia M. Taylor, Christian F. Hempelmann.
Ontological semantic technology for detecting insider threat and social engineering.
San-Tsai Sun, Yazan Boshmaf, Kirstie Hawkey, Konstantin Beznosov.
A billion keys, but few locks: the crisis of web single sign-on.