Advanced Search 
IEEE Security & Privacy
Jan.-Feb. 2014 (vol. 12 no. 1)
ISSN: 1540-7993
Table of Contents
Front Covers
House Advertisement
Table of Contents
From the Editors
Humans in the Loop (Abstract)
Bill Horne, Associate Editor in Chief
pp. 3-4
News Briefs
Guest Editors' Introduction
M. Angela Sasse, University College London
pp. 11-13
M. Angela Sasse, University College London
Markus Jakobsson, ZapFraud
Rick Wash, Michigan State University
L. Jean Camp, Indiana University
pp. 39-42
Security Criteria
Ying-Dar Lin, National Chiao Tung University
Chia-Yin Lee, National Chiao Tung University
Hao-Chuan Tsai, National Chiao Tung University
pp. 43-53
Flooding Attacks
It All Depends
Prabir Bhattacharya, University of Cincinnati
Li Yang, University of Tennessee at Chattanooga
Minzhe Guo, University of Cincinnati
Kai Qian, Southern Polytechnic State University
Ming Yang, Southern Polytechnic State University
pp. 69-72
On the Horizon
Paul Ohm, University of Colorado Law School
pp. 73-76
Privacy Interests
Basic Training
Protecting Me (Abstract)
Richard Ford, Florida Institute of Technology
Marco Carvalho, Florida Institute of Technology
pp. 80-82
Systems Security
Sergey Bratus, Dartmouth College
Trey Darley, Splunk's Security Practice
Michael Locasto, University of Calgary
Meredith L. Patterson, Upstanding Hackers
Rebecca bx Shapiro, Dartmouth University
Anna Shubina, Dartmouth Institute for Security, Technology, and Society
pp. 83-87
Last Word
Usage of this product signifies your acceptance of the Terms of Use.