<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://dtrap-blog.acm.org/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://dtrap-blog.acm.org/2018/09/05/the-dtrap-blog/</loc></url><url><loc>https://dtrap-blog.acm.org/2018/09/11/rubric-for-journal-fit/</loc></url><url><loc>https://dtrap-blog.acm.org/2018/09/18/seeking-submissions-for-dtrap-columns/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/03/29/field-notes-rapid-communications-in-the-dtrap-journal/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/04/01/the-lab-vs-the-real-world/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/04/16/future-malware-directions/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/04/30/the-principle-of-containment/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/04/23/jumping-to-conclusions-without-a-parachute/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/04/01/why-be-a-reviewer/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/04/09/surprise-its-a-problem/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/04/22/transparency-dont-forget-to-tell-me-everything/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/05/04/double-blind/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/05/14/moving-from-research-to-practice/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/05/07/the-benefit-of-hindsight/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/05/21/sampling-bias/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/05/29/malware-and-caves-and-dragons-oh-my/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/05/13/special-issue-on-cyber-risk-and-insurance/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/06/25/minding-the-air-gap/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/08/26/negative-results-are-a-good-thing/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/06/04/ddos-me-no-ddos-you/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/05/24/a-little-more-conversation/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/06/11/special-issue-on-fake-news/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/07/17/how-do-you-solve-a-problem-like-mirai/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/08/19/practical-implementations-please/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/09/04/hackers-can-turn-your-home-computer-into-a-bomb/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/09/09/getting-from-research-to-practice/</loc></url><url><loc>https://dtrap-blog.acm.org/2019/10/14/special-issue-on-the-digital-threats-of-hardware-security/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/03/23/what-wont-be-on-the-internet/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/03/30/was-it-satan/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/03/13/nothing-new-under-the-sun/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/04/01/bleeding-hearts/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/03/16/dtrap-special-issue-on-election-security/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/03/18/field-notes-or-notes-from-the-field/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/03/20/what-is-an-iot-device/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/03/25/which-domains-are-good/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/05/18/dont-press-that-button/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/03/31/not-attack-dogs-attack-usbs/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/04/13/digital-threats-of-hardware/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/05/07/the-usb-of-doom/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/04/06/digital-threats-to-elections/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/04/10/the-theoretical-chicken/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/04/16/assumptions-and-vulnerabilities-dont-mix/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/04/20/a-matter-of-convenience/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/04/24/reviewing-for-a-journal/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/04/27/u-and-mption/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/05/14/statistics-a-mathematicians-view/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/05/11/how-do-you-know/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/05/06/special-issue-on-situational-awareness/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/05/21/insider-threat-not-a-new-problem/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/05/22/election-security-and-covid-19-dont-mix/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/06/02/notes-from-the-field/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/06/08/base-rate-fallacy/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/07/27/what-does-an-associate-editor-do/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/06/22/transparency-in-an-opaque-world/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/07/06/how-to-start-a-field-note/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/07/20/the-once-and-future-password/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/07/02/the-digital-threats-to-artificial-intelligence/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/08/03/trust-but-verify/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/07/30/special-issue-on-actionable-information/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/08/06/special-issue-on-challenges-and-trends-in-malware-analysis/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/08/26/digital-threats-to-the-internet/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/08/19/false-positive-false-negative/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/08/28/special-issue-on-vulnerabilities/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/10/15/operating-systems-operate/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/09/15/dtrap-special-issue-on-the-lifecycle-of-iot-insecurity/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/09/17/dtrap-special-issue-on-security-privacy-for-covid-19/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/10/12/reviewing-basics/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/10/19/writing-a-review/</loc></url><url><loc>https://dtrap-blog.acm.org/2020/10/26/erecting-a-dtrap-column/</loc></url><url><loc>https://dtrap-blog.acm.org/2021/01/20/mean-vs-median-cage-match/</loc></url><url><loc>https://dtrap-blog.acm.org/2021/01/13/writing-reviews-revisited/</loc></url><url><loc>https://dtrap-blog.acm.org/2021/01/26/ddos-defense-and-research/</loc></url><url><loc>https://dtrap-blog.acm.org/2021/02/04/no-pie-charts-without-pie/</loc></url><url><loc>https://dtrap-blog.acm.org/2021/02/24/offensive-machine-learning/</loc></url><url><loc>https://dtrap-blog.acm.org/2022/05/25/special-issue-on-memory-based-malware-and-other-unconventional-threats/</loc></url><url><loc>https://dtrap-blog.acm.org/2022/05/27/extended-call-for-papers/</loc></url><url><loc>https://dtrap-blog.acm.org/2022/05/31/dtraps-mentoring-program/</loc></url></urlset>
