The Community for Technology Leaders
Green Image
Issue No. 02 - March/April (vol. 10)
ISSN: 1540-7993
From the Editors

Can We Be Too Careful? (HTML)

Jeremy Epstein , Associate Editor in Chief
pp. 3-5
10th Anniversary Exclusive

Reflecting on Some Past Predictions (Abstract)

Jeremy Epstein , SRI International
pp. 7-10
News Briefs
Security Training and Education

Guest Editors' Introduction (HTML)

Shari Lawrence Pfleeger , Dartmouth College
Cynthia Irvine , Naval Postgraduate School
Mischel Kwon , Mischel Kwon and Associates
pp. 19-23

Security Education against Phishing: A Modest Proposal for a Major Rethink (Abstract)

Iacovos Kirlappos , University College London
M. Angela Sasse , University College London
pp. 24-32

Holistically Building the Cybersecurity Workforce (Abstract)

Lance J. Hoffman , George Washington University
Diana L. Burley , George Washington University
Costis Toregas , George Washington University
pp. 33-39

Basing Cybersecurity Training on User Perceptions (Abstract)

Susanne M. Furman , National Institute of Standards and Technology
Mary Frances Theofanos , National Institute of Standards and Technology
Yee-Yin Choong , National Institute of Standards and Technology
Brian Stanton , National Institute of Standards and Technology
pp. 40-49

Educating Cyber Professionals: A View from Academia, the Private Sector, and Government (Abstract)

Mischel Kwon , Mischel Kwon and Associates
Michael J. Jacobs , Cybersecurity Consultant
Christopher G. Ipsen , State of Nevada
James Foley , Georgia Tech
pp. 50-53
Defense Models
Flood Attacks

Microsoft vs. Apple: Resilience against Distributed Denial-of-Service Attacks (Abstract)

Sanjeev Kumar , The University of Texas-Pan American
Sirisha Surisetty , University of Texas - Pan American
pp. 60-64
Conference Spotlight
It All Depends
Privacy Interests

The Menlo Report (Abstract)

Michael Bailey , University of Michigan
David Dittrich , University of Washington
Erin Kenneally , University of California, San Diego
Doug Maughan , Department of Homeland Security
pp. 71-75
Crypto Corner

Lightweight Cryptography for RFID Tags (Abstract)

Diana Maimut , École normale supérieure
Khaled Ouafi , École polytechnique fédérale de Lausanne
pp. 76-79
Basic Training

Unintended Consequences: Digital Evidence in Our Legal System (Abstract)

Barbara Endicott-Popovsky , University of Washington
Donald J. Horowitz , Superior Court Judge (retired), King County, Washington
pp. 80-83
Attack Trends
Secure Systems

A Patch for Postel's Robustness Principle (Abstract)

Len Sassaman , Katholieke Universiteit Leuven
Sergey Bratus , Dartmouth College
pp. 87-91
Security & Privacy Economics
Building Security In
For Good Measure

Numbers Worth Having (HTML)

pp. 102-103
87 ms
(Ver 3.3 (11022016))