| Author | Paper Title |
|---|---|
| Bishop | Open Problems in Data Sanitization |
| Conti | Googling Considered Harmful |
| Danezis | A Pact with the Devil |
| Ford | Cent, Five Cent, Ten Cent, Dollar: Hitting Botnets Where it Really Hurts |
| Greenwald | E-Prime for Security: A New Security Paradigm |
| Guttman | Panel on PKI Design for the RealWorld |
| Locasto | Dark Application Communities |
| McHugh | Patrol vs. Control: A new paradigm for network monitoring |
| Shmatikov | Large-Scale Collection and Sanitization of Network Security Data: Risks and Challenges |
| Taylor | Challenging the Anomaly Detection Paradigm: A Provocative Discussion |
| Wang | Diffusion and Graph-Spectral Methods for Network Forensic Analysis |
| Neagoe | Inconsistency in Deception for Defense |