The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 03 - Mar. (vol. 49)
ISSN: 0018-9162

Front Cover (PDF)

pp. c1

Table of Contents (PDF)

pp. 1-2
70th Anniversary Milestones

Bodies of Knowledge (HTML)

pp. 3

Masthead (PDF)

pp. 4
Spotlight on Transactions

Using 2D Maps for 3D Localization (HTML)

Leila De Floriani , University of Genoa
pp. 5
Elsewhere in the CS
32 & 16 Years Ago

32 & 16 Years Ago (HTML)

pp. 8-9
Guest Editors' Introduction

Communication and Privacy under Surveillance (HTML)

Ying-Dar Lin , National Chiao Tung University
Jeffrey Voas , IEEE Fellow
Antonio Pescape , University of Naples Federico II
Peter Mueller , IBM Zurich Research Laboratory
pp. 10-13
Communications and Privacy Under Surveillance

Insecure Surveillance: Technical Issues with Remote Computer Searches (Abstract)

Steven M. Bellovin , Columbia University
Matt Blaze , University of Pennsylvania
Susan Landau , Worcester Polytechnic Institute
pp. 14-24

Call for nominees (PDF)

pp. 41
Communications and Privacy Under Surveillance

How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation (Abstract)

Robert Koch , Universität der Bundeswehr München
Mario Golling , Universität der Bundeswehr München
Gabi Dreo Rodosek , Universität der Bundeswehr München
pp. 42-49

Using Passive Measurements to Demystify Online Trackers (Abstract)

Hassan Metwalley , Politecnico di Torino
Stefano Traverso , Politecnico di Torino
Marco Mellia , Politecnico di Torino
pp. 50-55
Research Feature

Mitigating Cross-Site Scripting Attacks with a Content Security Policy (Abstract)

Imran Yusof , International Islamic University Malaysia
Al-Sakib Khan Pathan , International Islamic University Malaysia
pp. 56-63

Semantic, Cognitive, and Perceptual Computing: Paradigms That Shape Human Experience (Abstract)

Amit Sheth , Kno.e.sis-Wright State University
Pramod Anantharam , Kno.e.sis-Wright State University
Cory Henson , Bosch Research and Technology Center
pp. 64-72
Out of Band

Net Neutrality vs. Net Neutering (HTML)

Hal Berghel , University of Nevada, Las Vegas
pp. 73-77
Cloud Cover

Trustworthy Digital Forensics in the Cloud (Abstract)

Shams Zawoad , University of Alabama at Birmingham
Ragib Hasan , University of Alabama at Birmingham
pp. 78-81
Aftershock

The STEM Anxiety Business (HTML)

Robert N. Charette , ITABHI Corporation
pp. 82-87
Computing Education
Standards

Practical Insights from the Peculiar World of Standards (HTML)

Karen Bartleson , 2016 IEEE President-Elect and Synopsis
pp. 92-96
Social Computing

How Socially Aware Are Social Media Privacy Controls? (Abstract)

Gaurav Misra , Lancaster University
Jose M. Such , Lancaster University
pp. 96-99
Student Design Showcase

Immortal Bits: Managing Our Digital Legacies (HTML)

Greg Byrd , North Carolina State University
pp. 100-103
Cybertrust

On the Move: Evading Distributed Denial-of-Service Attacks (Abstract)

Angelos Stavrou , George Mason University
Daniel Fleck , George Mason University
Constantinos Kolias , George Mason University
pp. 104-107
The Errant Hashtag

Go, Stop, Go, Stop (HTML)

David Alan Grier , George Washington University
pp. 128
85 ms
(Ver 3.3 (11022016))