Authors
J Alves-Foss, S Applegate, W Arbaugh, B Arkin, T Babbitt, M Bailey, D Barrera, J Bau, JL Bayuk, R Bejtlich, SM Bellovin, TA Berson, R Beyah, M Bishop, RE Bloomfield, C Bravo-Lillo, J Caroland, FH Cate, H Chabanne, B Chess, S Cheung, C Chu, G Conti, M Cova, LP Cox, LF Cranor, O Dale, A Datta, D DeFigueiredo, JP Degabriele, DE Denning, D Dhillon, J Diamant, S Dietrich, G Dinolt, D Dittrich, M Donner, J Downs, W Du, DP Duggan, A Ekelhart, D Elliott, D Evans, S Fenz, K Ferguson-Boucher, DP Fidler, R Fly, J Franklin, DA Frincke, K Fuglerud, L Garber, SL Garfinkel, D Garg, DE Geer Jr, A Ghosh, B Gilbert, C Greamo, I Grigg, B Grobauer, D Guido, C Gunter, P Gutmann, RR Heckle, S Heelan, L Hively, C Irvine, T Jaeger, L Jia, M Kaaniche, P Karger, LM Kaufman, D Kaynar, R Kemmerer, S Komanduri, C Kruegel, P Kuper, R Langner, M Lesk, T Levin, J Lewis, N Li, D Liebovitz, MC Little, D Liu, ME Locasto, J MacKie-Mason, B Malin, P McDaniel, G McGraw, S McIntosh, K McLaughlin, C Miller, JC Mitchell, KM Moriarty, T Moyer, DK Mulligan, J Nelson, QL Nguyen, P O'Kane, E Palmer
Description
2011 IEEE Security and Privacy Vol. 10 Page 1 AUTHOR INDEX A Alexander, J., and J. Smith, "Disinformation: A Taxonomy," Jan./Feb., pp. 58-63. Alves-Foss, J., see Weis, J., Nov./Dec. pp. 49-55. Applegate, S., "Cybermilitias and Political Hackers: Use of Irregular Forces in Cyberwarfare," Sep./Oct., pp. 16-22. Arbaugh, W., and DA Frincke, "Living with Insecurity," Nov./Dec., pp. 12-13. Arkin, B., "Never Waste a Crisis," May/June, pp. 82-85. Arkin, B., see Chess, B., Mar./Apr. pp. 89-92. B Babbitt, T., see Conti, G., May/June pp. 56-59. Bailey, M., see Dittrich, D., July/Aug. pp. 32-40. Barrera, D., and P. Van Oorschot, "Secure Software Installation on Smartphones," May/June, pp. 42-48. Bau, J., and JC Mitchell, "Security Modeling and Analysis," May/June, pp. 18-25. Bayuk, JL, "Systems Security Engineering," Mar./Apr., pp. 72-74. Bejtlich, R., J. Steven, and G. Peterson, "Directions in Incident Detection and Response," Jan./ …