The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 06 - November/December (vol. 4)
ISSN: 1540-7993
From the Editors

Weak Links, Strong Ties (HTML)

George Cybenko , Dartmouth University
pp. 3
Book Reviews

Desert Island Books (HTML)

Eugene Spafford , Purdue University
pp. 5
News

News Briefs (HTML)

pp. 6-9
Interview
Data Surveillance

Guest Editors' Introduction: Data Surveillance (HTML)

Michael D. Smith , Harvard University
Simson Garfinkel , Harvard University
pp. 15-17

Countering Terrorism through Information and Privacy Protection Technologies (Abstract)

John Poindexter , JMP Consulting
Robert Popp , National Security Innovations
pp. 18-27
Intrusion Detection

Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion (Abstract)

Barry E. Mullins , US Air Force Institute of Technology
Richard A. Raines , US Air Force Institute of Technology
David J. Chaboya , US Air Force Institute of Technology
Rusty O. Baldwin , US Air Force Institute of Technology
pp. 36-43
Measuring Loss
Conference Reports

Soups 2006 (HTML)

Janice Y. Tsai , Carnegie Mellon University
Serge Egelman , Carnegie Mellon University
pp. 53-55
Education

Computer Security Education and Research: Handle with Care (Abstract)

Bradley S. Rubin , University of St. Thomas
Donald Cheung , Minnesota Bureau of Criminal Apprehension
pp. 56-59
On The Horizon

Privacy-Enabled Global Threat Monitoring (Abstract)

Phillip A. Porras , SRI International
pp. 60-63
Privacy Interests
Crypto Corner

Cryptography, Law Enforcement, and Mobile Communications (Abstract)

Vanessa Gratzer , Universit? Paris II Panth?on-Assas
David Naccache , ?cole normale sup?rieure
pp. 67-70
Basic Training
Secure Systems

Systemic Security Management (Abstract)

Terry V. Benzel , University of Southern California
Laree Kiely , The Kiely Group
pp. 74-77
Digital Protection

Strengthening the Weakest Link in Digital Protection (Abstract)

Edward Sobiesk , US Military Academy
William Suchan , US Military Academy
pp. 78-80
Building Security In
Emerging Standards

Common Vulnerability Scoring System (Abstract)

Peter Mell , US National Institute of Standards and Technology
Sasha Romanosky , Carnegie Mellon University
Karen Scarfone , US National Institute of Standards and Technology
pp. 85-89
IEEE Security & Privacy 2006 Annual Index, Volume 4
Clear Text

Evidently Evidentiary (Abstract)

pp. 96
105 ms
(Ver 3.3 (11022016))