Internet instability and disturbance: goal or menace? (DOI)
Richard Ford, Mark Bush, Alex Boulatov
Diversity as a computer defense mechanism (DOI)
Carol Taylor, Jim Alves-Foss
Diversity: the biological perspective position statement (DOI)
Carol Taylor
"Diversity as a computer defense mechanism" (DOI)
Bev Littlewood
Software diversity: use of diversity as a defense mechanism (DOI)
John McHugh
Use of diversity as a defense mechanism (DOI)
Roy A. Maxion
Average case vs. worst case: margins of safety in system design (DOI)
Christian W. Probst, Andreas Gal, Michael Franz
Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems (DOI)
Ivan Flechais, Jens Riegelsberger, M. Angela Sasse
Pass-thoughts: authenticating with our minds (DOI)
Julie Thorpe, P. C. van Oorschot, Anil Somayaji
Message authentication by integrity with public corroboration (DOI)
P. C. van Oorschot
Flooding and recycling authorizations (DOI)
Konstantin (Kosta) Beznosov
The insider problem revisited (DOI)
Matt Bishop
Position: "insider" is relative (DOI)
Matt Bishop
Position paper (DOI)
Irene Schwarting
Principles-driven forensic analysis (DOI)
Sean Peisert, Sidney Karin, Matt Bishop, Keith Marzullo
Visual security protocol modeling (DOI)
J. McDermott
Empirical privilege profiling (DOI)
Carla Marceau, Rob Joyce
Speculative virtual verification: policy-constrained speculative execution (DOI)
Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis