21. Concurrency and Communication: Lessons from the SHIM Project Edwards, Stephen A. 2009 Articles Computer science
22. Configuration Management and Security Bellovin, Steven Michael; Bush, Randy 2009 Articles Computer science
23. Cybersecurity through an Identity Management System Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2009 Articles Computer science
24. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos 2009 Articles Computer science
25. Designing Host and Network Sensors to Mitigate the Insider Threat Bowen, Brian M.; Ben Salem, Malek; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
26. Discovering influential variables: A method of partitions Chernoff, Herman; Lo, Shaw-Hwa; Zheng, Tian 2009 Articles Computer scienceStatistics
27. DoubleCheck: Multi-path Verification Against Man-in-the-Middle Attacks Alicherry, Mansoor; Keromytis, Angelos D. 2009 Articles Computer science
28. Dynamic Trust Management Blaze, Matt; Kannan, Sampath; Lee, Insup; Sokolsky, Oleg; Smith, Jonathan M.; Keromytis, Angelos D.; Lee, Wenke 2009 Articles Computer science
29. Elastic Block Ciphers: Method, Security and Instantiations Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2009 Articles Computer science
30. Evaluating a Collaborative Defense Architecture for MANETs Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos 2009 Articles Computer science