Advanced Search 
IEEE Security & Privacy
July/August 2005 (vol. 3 no. 4)
ISSN: 1540-7993
Table of Contents
From the Editors
Book Reviews
Software Development
Axelle Apvrille, Ericsson Research Canada
Makan Pourzandi, Ericsson Research Canada
pp. 10-17
Attack Models
Michael Bailey, University of Michigan
Evan Cooke, University of Michigan
Farnam Jahanian, University of Michigan
David Watson, University of Michigan
Jose Nazario, Arbor Networks
pp. 26-31
Vulnerability Disclosure
Dimitrios Lekkas, University of the Aegean
Diomidis Spinellis, Athens University of Economics and Business
pp. 32-41
Conference Reports
Matt Bishop, University of California, Davis
Deborah Frincke, Pacific Northwest National Laboratories
pp. 49-51
On the Horizon
Crypto Corner
Security Usability (Abstract)
Peter Gutmann, University of Auckland
Ian Grigg, Systemics
pp. 56-58
Basic Training
Computer Forensics (Abstract)
William H. Allen, Florida Institute of Technology
pp. 59-62
Attack Trends
Iv? Arce, Core Security Technologies
pp. 63-67
Secure Systems
Digital Protection
Building Security In
Nancy R. Mead, Software Engineering Institute
Gary McGraw, Cigital
pp. 75-79
Usage of this product signifies your acceptance of the Terms of Use.