Advanced Search 
IEEE Security & Privacy
January/February 2011 (vol. 9 no. 1)
ISSN: 1540-7993
Table of Contents
From the Editors
Reality Check (HTML)
John Viega, Perimeter E-Security
pp. 3-4
2010 Reviewer Thanks
Interview
Focus
Giovanni Vigna, University of California, Santa Barbara
pp. 12-14
News Briefs
Engineering Secure Systems
Cynthia Irvine, Naval Postgraduate School
J.R. Rao, IBM Thomas J. Watson Research Center
pp. 18-21
Joshua Schiffman, Pennsylvania State University
Thomas Moyer, Pennsylvania State University
Trent Jaeger, Pennsylvania State University
Patrick McDaniel, Pennsylvania State University
pp. 40-48
Risk Assessment
M. Eric Johnson, Dartmouth College
Shari Pfleeger, Dartmouth College
pp. 49-57
Deception and Surveillance
James Alexander, University of Pennsylvania
Jonathan Smith, University of Pennsylvania
pp. 58-63
Malware Analysis
Brett Stone-Gross, University of California, Santa Barbara
Marco Cova, University of California, Santa Barbara
Bob Gilbert, University of California, Santa Barbara
Richard Kemmerer, University of California, Santa Barbara
Christopher Kruegel, University of California, Santa Barbara
Giovanni Vigna, University of California Santa Barbara
pp. 64-72
It All Depends
Lori M. Kaufman, Carnegie Mellon University
pp. 73-75
Privacy Interests
Attack Trends
Didier Stevens, Contraste Europe NV
pp. 80-82
Secure Systems
Wendy Seltzer, Chilling Effects Clearinghouse
pp. 83-87
Security & Privacy Economics
Michael Lesk, Rutgers University
pp. 88-90
Building Security In
For Good Measure
ClearText
Usage of this product signifies your acceptance of the Terms of Use.