IEEE Security & Privacy cover image for year 2015 issue number 02

IEEE Security & Privacy

Volume 13, Issue 2

Mar.-Apr. 2015

Table of Contents

Table of ContentsFreely available from IEEE.pp. 1-2
MastheadFreely available from IEEE.pp. 6-6
Silver Bullet Talks with Whitfield DiffieFreely available from IEEE.pp. 7-10
An Overview of ANONIZE: A Large-Scale Anonymous Survey SystemFull-text access may be available. Sign in or learn about subscription options.pp. 22-29
Automatic Software DiversityFull-text access may be available. Sign in or learn about subscription options.pp. 30-37
Dancing with Giants: Wimpy Kernels for On-Demand I/O IsolationFull-text access may be available. Sign in or learn about subscription options.pp. 38-46
Introspections on the Semantic GapFull-text access may be available. Sign in or learn about subscription options.pp. 48-55
Be Prepared: The EMV Preplay AttackFull-text access may be available. Sign in or learn about subscription options.pp. 56-64
Gaining an Edge in Cyberspace with Advanced Situational AwarenessFull-text access may be available. Sign in or learn about subscription options.pp. 65-74
Evaluation Theory and Practice Applied to Cybersecurity EducationFull-text access may be available. Sign in or learn about subscription options.pp. 75-80
Automated Proof and Flaw-Finding Tools in CryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 81-83
Understanding Cybercrime from Its Stakeholders' Perspectives: Part 2--Defenders and VictimsFull-text access may be available. Sign in or learn about subscription options.pp. 84-88
Information Hiding as a Challenge for Malware DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 89-93
Never Mind Pearl Harbor--What about a Cyber Love Canal?Full-text access may be available. Sign in or learn about subscription options.pp. 94-98
Safety Risks--Human Error or Mechanical Failure?: Lessons from RailwaysFull-text access may be available. Sign in or learn about subscription options.pp. 99-102
Informed Consent: We Can Do Better to Defend PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 103-107
The Security Value of Muddling ThroughFreely available from IEEE.pp. 108-108
Showing 20 out of 20