NSPW C

13 papers

YearTitle / Authors
2008A profitless endeavor: phishing as tragedy of the commons.
Cormac Herley, Dinei A. F. Florêncio
2008Choose the red pill
Ben Laurie, Abe Singer
2008Localization of credential information to address increasingly inevitable data breaches.
Mohammad Mannan, Paul C. van Oorschot
2008Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008
Matt Bishop, Christian W. Probst, Angelos D. Keromytis, Anil Somayaji
2008ROFL: routing as the firewall layer.
Hang Zhao, Chi-Kin Chau, Steven M. Bellovin
2008Security compliance: the next frontier in security research.
Klaus Julisch
2008The compliance budget: managing security behaviour in organisations.
Adam Beautement, Martina Angela Sasse, Mike Wonham
2008The developer is the enemy.
Glenn Wurster, Paul C. van Oorschot
2008The ecology of Malware.
Jedidiah R. Crandall, Roya Ensafi, Stephanie Forrest, Joshua Ladau, Bilal Shebaro
2008The user is not the enemy: fighting malware by tracking user intentions.
Jeff Shirley, David Evans
2008Towards an ethical code for information security?
Steven J. Greenwald, Brian D. Snow, Richard Ford, Richard Thieme
2008Trading in risk: using markets to improve access control.
Ian M. Molloy, Pau-Chen Cheng, Pankaj Rohatgi
2008We have met the enemy and he is us.
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, Carrie Gates