Wilson A, B, C
Detection of rogue access points using clock skews: does it really work?
Flying Instruments-Only: Legal and Privacy Issues in Cloud Computing
Tales from the Crypto
De Gustibus - Adventures in Hacking Taste
Cyborg Information Security: Defense Against the Dark Arts
Recovering Evidentiary Artifacts from Virtual Machines and Hypervisor Environments
The Splendiferous Story of Archive Team and the Rapidly Disappearing Digital Heritage
Becoming Jack Flack: Real Life Cloak & Dagger
Back to the Glass House
Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications