The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 03 - May-June (vol. 14)
ISSN: 1540-7993

Front Cover (PDF)

pp. c1

Table of Contents (PDF)

pp. 1-2
From the Editors

Masthead (PDF)

pp. 6
Interview
Guest Editors' Introduction

What's New in the Economics of Cybersecurity? (HTML)

Massimo Felici , Hewlett Packard Enterprise
Nick Wainwright , Hewlett Packard Enterprise
Simona Cavallini , FORMIT Foundation
Fabio Bisogni , FORMIT Foundation
pp. 11-13
Economics of Cybersecurity, Part 2

The Navigation Metaphor in Security Economics (Abstract)

Wolter Pieters , Delft University of Technology
Margaret Ford , Consult Hyperion
Claude P.R. Heath , Royal Holloway, University of London
Christian W. Probst , Technical University of Denmark
Ruud Verbij , KPMG Netherlands
pp. 14-21

Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces (Abstract)

Ziming Zhao , Arizona State University
Mukund Sankaran , Arizona State University
Gail-Joon Ahn , Arizona State University
Thomas J. Holt , Michigan State University
Yiming Jing , Arizona State University
Hongxin Hu , Clemson University
pp. 32-43

Designing Cybersecurity into Defense Systems: An Information Economics Approach (Abstract)

Chad Dacus , Air University Cyber College
Panayotis A. Yannakogeorgos , Air University Cyber College
pp. 44-51
Smart Technology

HbbTV Security and Privacy: Issues and Challenges (Abstract)

Marco Ghiglieri , Technische Universität Darmstadt
Michael Waidner , Technische Universität Darmstadt
pp. 61-67
Systems Security

Machine Learning in Adversarial Settings (Abstract)

Patrick McDaniel , Pennsylvania State University
Nicolas Papernot , Pennsylvania State University
Z. Berkay Celik , Pennsylvania State University
pp. 68-72
IT All Depends

Quantifiably Trusting the Cloud: Putting Metrics to Work (Abstract)

Ruben Trapero , Technische Universität Darmstadt
Jesus Luna , Technische Universität Darmstadt
Neeraj Suri , Technische Universität Darmstadt
pp. 73-77
Crypto Corner

Cdoe Obofsucaitn: Securing Software from Within (Abstract)

Marc Beunardeau , École Normale Supérieure
Aisling Connolly , École Normale Supérieure
Remi Geraud , École Normale Supérieure
David Naccache , École Normale Supérieure
pp. 78-81
In Our Orbit

Security Dialogues: Building Better Relationships between Security and Business (Abstract)

Debi Ashenden , Cranfield University at the Defence Academy of the United Kingdom
Darren Lawrence , Cranfield University at the Defence Academy of the United Kingdom
pp. 82-87
Last Word

Attack Surfaces (HTML)

Steven M. Bellovin , Columbia University
pp. 88
88 ms
(Ver 3.3 (11022016))