Advanced Search 
IEEE Security & Privacy
March/April 2012 (vol. 10 no. 2)
ISSN: 1540-7993
Table of Contents
From the Editors
Jeremy Epstein, Associate Editor in Chief
pp. 3-5
10th Anniversary Exclusive
Interview
News Briefs
Security Training and Education
Shari Lawrence Pfleeger, Dartmouth College
Cynthia Irvine, Naval Postgraduate School
Mischel Kwon, Mischel Kwon and Associates
pp. 19-23
Lance J. Hoffman, George Washington University
Diana L. Burley, George Washington University
Costis Toregas, George Washington University
pp. 33-39
Susanne M. Furman, National Institute of Standards and Technology
Mary Frances Theofanos, National Institute of Standards and Technology
Yee-Yin Choong, National Institute of Standards and Technology
Brian Stanton, National Institute of Standards and Technology
pp. 40-49
Mischel Kwon, Mischel Kwon and Associates
Michael J. Jacobs, Cybersecurity Consultant
Christopher G. Ipsen, State of Nevada
James Foley, Georgia Tech
pp. 50-53
Defense Models
Flood Attacks
Sanjeev Kumar, The University of Texas-Pan American
Sirisha Surisetty, University of Texas - Pan American
pp. 60-64
Conference Spotlight
It All Depends
Privacy Interests
The Menlo Report (Abstract)
Michael Bailey, University of Michigan
David Dittrich, University of Washington
Erin Kenneally, University of California, San Diego
Doug Maughan, Department of Homeland Security
pp. 71-75
Crypto Corner
Diana Maimut, École normale supérieure
Khaled Ouafi, École polytechnique fédérale de Lausanne
pp. 76-79
Basic Training
Barbara Endicott-Popovsky, University of Washington
Donald J. Horowitz, Superior Court Judge (retired), King County, Washington
pp. 80-83
Attack Trends
Secure Systems
Len Sassaman, Katholieke Universiteit Leuven
Sergey Bratus, Dartmouth College
pp. 87-91
Security & Privacy Economics
Building Security In
For Good Measure
ClearText
Usage of this product signifies your acceptance of the Terms of Use.