The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 05 - Sept.-Oct. (vol. 12)
ISSN: 1540-7993

Table of contents (PDF)

pp. 1-2

[Masthead] (PDF)

pp. 5

Designed-in Security for Cyber-Physical Systems (HTML)

Sean Peisert , Lawrence Berkeley National Laboratory and University of California, Davis
David M. Nicol , University of Illinois
Himanshu Khurana , Honeywell
Chris Sawall , Ameren
pp. 9-12

On Computer Security Incident Response Teams (HTML)

Bill Horne , Hewlett-Packard Laboratories
pp. 13-15

Computer Security Incident Response Team Development and Evolution (Abstract)

Robin Ruefle , Carnegie Mellon University
Audrey Dorofee , Carnegie Mellon University
David Mundie , Carnegie Mellon University
Allen D. Householder , Carnegie Mellon University
Michael Murray , Carnegie Mellon University
Samuel J. Perl , Carnegie Mellon University
pp. 16-26

A Dutch Approach to Cybersecurity through Participation (Abstract)

Kas Clark , Dutch National Cyber Security Centre
Don Stikvoort , S-CURE
Eelco Stofbergen , Dutch National Cyber Security Centre
Elly van den Heuvel , Dutch National Cyber Security Centre
pp. 27-34

The Operational Role of Security Information and Event Management Systems (Abstract)

Sandeep Bhatt , Hewlett-Packard Laboratories
Pratyusa K. Manadhata , Hewlett-Packard Laboratories
Loai Zomlot , Hewlett-Packard Laboratories
pp. 35-41

An Anthropological Approach to Studying CSIRTs (Abstract)

Sathya Chandran Sundaramurthy , Kansas State University
John McHugh , RedJack
Xinming Simon Ou , Kansas State University
S. Raj Rajagopalan , Honeywell
Michael Wesch , Kansas State University
pp. 52-60

An Organizational Psychology Perspective to Examining Computer Security Incident Response Teams (Abstract)

Tiffani R. Chen , George Mason University
Daniel B. Shore , George Mason University
Stephen J. Zaccaro , George Mason University
Reeshad S. Dalal , George Mason University
Lois E. Tetrick , George Mason University
Aiva K. Gorab , George Mason University
pp. 61-67

Off-Path Hacking: The Illusion of Challenge-Response Authentication (Abstract)

Yossi Gilad , Bar Ilan University
Amir Herzberg , Bar Ilan University
Haya Shulman , Technische Universität Darmstadt
pp. 68-77

Where in the World Is My Information?: Giving People Access to Their Data (Abstract)

Katrine Evans , Office of the New Zealand Privacy Commissioner
pp. 78-81

Building Reliable and Secure Virtual Machines Using Architectural Invariants (Abstract)

Cuong Pham , University of Illinois at Urbana-Champaign
Zachary J. Estrada , University of Illinois at Urbana-Champaign
Phuong Cao , University of Illinois at Urbana-Champaign
Zbigniew Kalbarczyk , University of Illinois at Urbana-Champaign
Ravishankar K. Iyer , University of Illinois at Urbana-Champaign
pp. 82-85

Can We Afford Privacy from Surveillance? (Abstract)

Jeffrey MacKie-Mason , University of Michigan
pp. 86-89

The Future of Incident Response (HTML)

Bruce Schneier , Co3 Systems
pp. 96
87 ms
(Ver 3.3 (11022016))