Search dblp for Publications

export results for "toc:db/journals/ieeesp/ieeesp16.bht:"

 download as .bib file

@article{DBLP:journals/ieeesp/AhmedR18,
  author       = {Irfan Ahmed and
                  Vassil Roussev},
  title        = {Peer Instruction Teaching Methodology for Cybersecurity Education},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {4},
  pages        = {88--91},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3111242},
  doi          = {10.1109/MSP.2018.3111242},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AhmedR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/AlbaneseJV18,
  author       = {Massimiliano Albanese and
                  Sushil Jajodia and
                  Sridhar Venkatesan},
  title        = {Defending from Stealthy Botnets Using Moving Target Defenses},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {1},
  pages        = {92--97},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1331034},
  doi          = {10.1109/MSP.2018.1331034},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AlbaneseJV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/AltmanWV18,
  author       = {Micah Altman and
                  Alexandra Wood and
                  Effy Vayena},
  title        = {A Harm-Reduction Framework for Algorithmic Fairness},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {3},
  pages        = {34--45},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.2701149},
  doi          = {10.1109/MSP.2018.2701149},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AltmanWV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/AranhaG18,
  author       = {Diego F. Aranha and
                  Jeroen van de Graaf},
  title        = {The Good, the Bad, and the Ugly: Two Decades of E-Voting in Brazil},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {6},
  pages        = {22--30},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSEC.2018.2875318},
  doi          = {10.1109/MSEC.2018.2875318},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AranhaG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/AvgerinosBDGNRW18,
  author       = {Thanassis Avgerinos and
                  David Brumley and
                  John Davis and
                  Ryan Goulden and
                  Tyler Nighswander and
                  Alexandre Rebert and
                  Ned Williamson},
  title        = {The Mayhem Cyber Reasoning System},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {2},
  pages        = {52--60},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1870873},
  doi          = {10.1109/MSP.2018.1870873},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AvgerinosBDGNRW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BansarkhaniGB18,
  author       = {Rachid El Bansarkhani and
                  Matthias Geihs and
                  Johannes Buchmann},
  title        = {PQChain: Strategic Design Decisions for Distributed Ledger Technologies
                  against Future Threats},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {4},
  pages        = {57--65},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3111246},
  doi          = {10.1109/MSP.2018.3111246},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BansarkhaniGB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BarcellosA18,
  author       = {Marinho P. Barcellos and
                  Diego F. Aranha},
  title        = {Research in Security and Privacy in Brazil},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {6},
  pages        = {14--21},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSEC.2018.2874855},
  doi          = {10.1109/MSEC.2018.2874855},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BarcellosA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin18,
  author       = {Steven M. Bellovin},
  title        = {Toward a National Cybersecurity Policy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {3},
  pages        = {108},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.2701148},
  doi          = {10.1109/MSP.2018.2701148},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BenzelP18,
  author       = {Terry Benzel and
                  Sean Peisert},
  title        = {Selected Papers from the 2017 {IEEE} Symposium on Security and Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {1},
  pages        = {10--11},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1331038},
  doi          = {10.1109/MSP.2018.1331038},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BenzelP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Binns18,
  author       = {Reuben Binns},
  title        = {What Can Political Philosophy Teach Us about Algorithmic Fairness?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {3},
  pages        = {73--80},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.2701147},
  doi          = {10.1109/MSP.2018.2701147},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Binns18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BlankKS18,
  author       = {Peter Blank and
                  Sabrina Kirrane and
                  Sarah Spiekermann},
  title        = {Privacy-Aware Restricted Areas for Unmanned Aerial Systems},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {2},
  pages        = {70--79},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1870868},
  doi          = {10.1109/MSP.2018.1870868},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BlankKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BryantD18,
  author       = {Timothy Bryant and
                  Shaun Davenport},
  title        = {A Honeybug for Automated Cyber Reasoning Systems},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {2},
  pages        = {32--36},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1870856},
  doi          = {10.1109/MSP.2018.1870856},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BryantD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BuchmannLM18,
  author       = {Johannes Buchmann and
                  Kristin E. Lauter and
                  Michele Mosca},
  title        = {Postquantum Cryptography, Part 2},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {5},
  pages        = {12--13},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3761714},
  doi          = {10.1109/MSP.2018.3761714},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BuchmannLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CeschinPCMOG18,
  author       = {Fabricio Ceschin and
                  Felipe Azevedo Pinage and
                  Marcos A. Castilho and
                  David Menotti and
                  Luiz S. Oliveira and
                  Andre Gregio},
  title        = {The Need for Speed: An Analysis of Brazilian Malware Classifers},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {6},
  pages        = {31--41},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSEC.2018.2875369},
  doi          = {10.1109/MSEC.2018.2875369},
  timestamp    = {Sat, 13 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CeschinPCMOG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ChenXGLS18,
  author       = {Lin Chen and
                  Lei Xu and
                  Zhimin Gao and
                  Yang Lu and
                  Weidong Shi},
  title        = {Tyranny of the Majority: On the (Im)possibility of Correctness of
                  Smart Contracts},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {4},
  pages        = {30--37},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3111240},
  doi          = {10.1109/MSP.2018.3111240},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ChenXGLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Connolly18,
  author       = {Aisling Connolly},
  title        = {Freedom of Encryption},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {1},
  pages        = {102--103},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1331023},
  doi          = {10.1109/MSP.2018.1331023},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Connolly18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/DunphyP18,
  author       = {Paul Dunphy and
                  Fabien A. P. Petitcolas},
  title        = {A First Look at Identity Management Schemes on the Blockchain},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {4},
  pages        = {20--29},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3111247},
  doi          = {10.1109/MSP.2018.3111247},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/DunphyP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/EdwardsV18,
  author       = {Lilian Edwards and
                  Michael Veale},
  title        = {Enslaving the Algorithm: From a "Right to an Explanation" to a "Right
                  to Better Decisions"?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {3},
  pages        = {46--54},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.2701152},
  doi          = {10.1109/MSP.2018.2701152},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/EdwardsV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Franz18,
  author       = {Michael Franz},
  title        = {Making Multivariant Programming Practical and Inexpensive},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {3},
  pages        = {90--94},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.2701161},
  doi          = {10.1109/MSP.2018.2701161},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Franz18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Geer18,
  author       = {Daniel E. Geer Jr.},
  title        = {Trading Places},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {1},
  pages        = {104},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1331041},
  doi          = {10.1109/MSP.2018.1331041},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Geer18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Geer18a,
  author       = {Daniel E. Geer Jr.},
  title        = {You Are What You Eat},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {4},
  pages        = {96},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3111250},
  doi          = {10.1109/MSP.2018.3111250},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Geer18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GiechaskielCR18,
  author       = {Ilias Giechaskiel and
                  Cas Cremers and
                  Kasper Bonne Rasmussen},
  title        = {When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under
                  Broken Primitives},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {4},
  pages        = {46--56},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3111253},
  doi          = {10.1109/MSP.2018.3111253},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GiechaskielCR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GoodmanD18,
  author       = {Peter Goodman and
                  Artem Dinaburg},
  title        = {The Past, Present, and Future of Cyberdyne},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {2},
  pages        = {61--69},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1870859},
  doi          = {10.1109/MSP.2018.1870859},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GoodmanD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GuFJCB18,
  author       = {Qinchen Gu and
                  David Formby and
                  Shouling Ji and
                  Hasan Cam and
                  Raheem A. Beyah},
  title        = {Fingerprinting for Cyber-Physical System Security: Device Physics
                  Matters Too},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {5},
  pages        = {49--59},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3761722},
  doi          = {10.1109/MSP.2018.3761722},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GuFJCB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/HaoCRS18,
  author       = {Feng Hao and
                  Dylan Clarke and
                  Brian Randell and
                  Siamak F. Shahandashti},
  title        = {Verifiable Classroom Voting in Practice},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {1},
  pages        = {72--81},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1331032},
  doi          = {10.1109/MSP.2018.1331032},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/HaoCRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/HenryHK18,
  author       = {Ryan Henry and
                  Amir Herzberg and
                  Aniket Kate},
  title        = {Blockchain Access Privacy: Challenges and Directions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {4},
  pages        = {38--45},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3111245},
  doi          = {10.1109/MSP.2018.3111245},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/HenryHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/HerleyO18,
  author       = {Cormac Herley and
                  Paul C. van Oorschot},
  title        = {Science of Security: Combining Theory and Measurement to Reflect the
                  Observable},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {1},
  pages        = {12--22},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1331028},
  doi          = {10.1109/MSP.2018.1331028},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/HerleyO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/HofstedePSR18,
  author       = {Rick Hofstede and
                  Aiko Pras and
                  Anna Sperotto and
                  Gabi Dreo Rodosek},
  title        = {Flow-Based Compromise Detection: Lessons Learned},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {1},
  pages        = {82--89},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1331021},
  doi          = {10.1109/MSP.2018.1331021},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/HofstedePSR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/JonesKE18,
  author       = {Meg Leta Jones and
                  Ellen Kaufman and
                  Elizabeth Edenberg},
  title        = {{AI} and the Ethics of Automating Consent},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {3},
  pages        = {64--72},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.2701155},
  doi          = {10.1109/MSP.2018.2701155},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/JonesKE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/JordanL18,
  author       = {Stephen P. Jordan and
                  Yi{-}Kai Liu},
  title        = {Quantum Cryptanalysis: Shor, Grover, and Beyond},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {5},
  pages        = {14--21},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3761719},
  doi          = {10.1109/MSP.2018.3761719},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/JordanL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KarameC18,
  author       = {Ghassan Karame and
                  Srdjan Capkun},
  title        = {Blockchain Security and Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {4},
  pages        = {11--12},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3111241},
  doi          = {10.1109/MSP.2018.3111241},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KarameC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KazaTS18,
  author       = {Siddharth Kaza and
                  Blair Taylor and
                  Kyle Sherbert},
  title        = {Hello, World! - Code Responsibly},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {1},
  pages        = {98--100},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1331035},
  doi          = {10.1109/MSP.2018.1331035},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KazaTS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KharrazRK18,
  author       = {Amin Kharraz and
                  William K. Robertson and
                  Engin Kirda},
  title        = {Protecting against Ransomware: {A} New Line of Research or Restating
                  Classic Ideas?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {3},
  pages        = {103--107},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.2701165},
  doi          = {10.1109/MSP.2018.2701165},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KharrazRK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KreutzYVMR18,
  author       = {Diego Kreutz and
                  Jiangshan Yu and
                  Paulo Jorge Esteves Ver{\'{\i}}ssimo and
                  Catia Magalhaes and
                  Fernando M. V. Ramos},
  title        = {The {KISS} Principle in Software-Defined Networking: {A} Framework
                  for Secure Communications},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {5},
  pages        = {60--70},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3761717},
  doi          = {10.1109/MSP.2018.3761717},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KreutzYVMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Kroll18,
  author       = {Joshua A. Kroll},
  title        = {Data Science Data Governance {[AI} Ethics]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {6},
  pages        = {61--70},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSEC.2018.2875329},
  doi          = {10.1109/MSEC.2018.2875329},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Kroll18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LebeckRKR18,
  author       = {Kiron Lebeck and
                  Kimberly Ruth and
                  Tadayoshi Kohno and
                  Franziska Roesner},
  title        = {Arya: Operating System Support for Securely Augmenting Reality},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {1},
  pages        = {44--53},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1331020},
  doi          = {10.1109/MSP.2018.1331020},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LebeckRKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LecuyerSGHS18,
  author       = {Mathias L{\'{e}}cuyer and
                  Riley Spahn and
                  Roxana Geambasu and
                  Tzu{-}Kuo Huang and
                  Siddhartha Sen},
  title        = {Enhancing Selectivity in Big Data},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {1},
  pages        = {34--42},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1331036},
  doi          = {10.1109/MSP.2018.1331036},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LecuyerSGHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LiuLKA18,
  author       = {Jian Liu and
                  Wenting Li and
                  Ghassan O. Karame and
                  N. Asokan},
  title        = {Toward Fairness of Cryptocurrency Payments},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {3},
  pages        = {81--89},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.2701163},
  doi          = {10.1109/MSP.2018.2701163},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LiuLKA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MatiasBCCA18,
  author       = {Paulo Matias and
                  Pedro Barbosa and
                  Thiago N. C. Cardoso and
                  Diego M. Campos and
                  Diego F. Aranha},
  title        = {{NIZKCTF:} {A} Noninteractive Zero-Knowledge Capture-the-Flag Platform},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {6},
  pages        = {42--51},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSEC.2018.2875324},
  doi          = {10.1109/MSEC.2018.2875324},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MatiasBCCA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McGraw18,
  author       = {Gary McGraw},
  title        = {Silver Bullet Talks with Wafaa Mamilli},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {1},
  pages        = {6--9},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1331039},
  doi          = {10.1109/MSP.2018.1331039},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McGraw18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McGraw18a,
  author       = {Gary McGraw},
  title        = {Silver Bullet Talks with Craig Froelich},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {2},
  pages        = {6--8},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1870860},
  doi          = {10.1109/MSP.2018.1870860},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McGraw18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McGraw18b,
  author       = {Gary McGraw},
  title        = {Silver Bullet Talks with Bruce Potter},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {3},
  pages        = {12--14},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.2701167},
  doi          = {10.1109/MSP.2018.2701167},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McGraw18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McGraw18c,
  author       = {Gary McGraw},
  title        = {Silver Bullet Talks with Nick Weaver},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {4},
  pages        = {7--10},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3111252},
  doi          = {10.1109/MSP.2018.3111252},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McGraw18c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McGraw18d,
  author       = {Gary McGraw},
  title        = {Silver Bullet Talks with Tanya Janca},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {5},
  pages        = {7--11},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3761705},
  doi          = {10.1109/MSP.2018.3761705},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McGraw18d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McGraw18e,
  author       = {Gary McGraw},
  title        = {Silver Bullet Talks With Kathleen Fisher [Interview]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {6},
  pages        = {4--9},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSEC.2018.2882152},
  doi          = {10.1109/MSEC.2018.2882152},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McGraw18e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McLeanHO18,
  author       = {John D. McLean and
                  Cormac Herley and
                  Paul C. van Oorschot},
  title        = {Letter to the Editor},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {3},
  pages        = {6--10},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.2701158},
  doi          = {10.1109/MSP.2018.2701158},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McLeanHO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Meiklejohn18,
  author       = {Sarah Meiklejohn},
  title        = {Top Ten Obstacles along Distributed Ledgers Path to Adoption},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {4},
  pages        = {13--19},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3111235},
  doi          = {10.1109/MSP.2018.3111235},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Meiklejohn18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Mosca18,
  author       = {Michele Mosca},
  title        = {Cybersecurity in an Era with Quantum Computers: Will We Be Ready?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {5},
  pages        = {38--41},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3761723},
  doi          = {10.1109/MSP.2018.3761723},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Mosca18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Nguyen-TuongMDC18,
  author       = {Anh Nguyen{-}Tuong and
                  David Melski and
                  Jack W. Davidson and
                  Michele Co and
                  William H. Hawkins and
                  Jason D. Hiser and
                  Derek Morris and
                  Ducson Nguyen and
                  Eric F. Rizzi},
  title        = {Xandra: An Autonomous Cyber Battle System for the Cyber Grand Challenge},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {2},
  pages        = {42--51},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1870876},
  doi          = {10.1109/MSP.2018.1870876},
  timestamp    = {Sat, 11 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Nguyen-TuongMDC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/OliveiraEKR18,
  author       = {Daniela Seabra Oliveira and
                  Jeremy Epstein and
                  James F. Kurose and
                  Anderson Rocha},
  title        = {Cybersecurity and Privacy Issues in Brazil: Back, Now, and Then [Guest
                  Editors' Introduction]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {6},
  pages        = {10--12},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSEC.2018.2874824},
  doi          = {10.1109/MSEC.2018.2874824},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/OliveiraEKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PearceELFP18,
  author       = {Paul Pearce and
                  Roya Ensafi and
                  Frank Li and
                  Nick Feamster and
                  Vern Paxson},
  title        = {Toward Continual Measurement of Global Network-Level Censorship},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {1},
  pages        = {24--33},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1331018},
  doi          = {10.1109/MSP.2018.1331018},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PearceELFP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PerrottaH18,
  author       = {Raffaello Perrotta and
                  Feng Hao},
  title        = {Botnet in the Browser: Understanding Threats Caused by Malicious Browser
                  Extensions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {4},
  pages        = {66--81},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3111249},
  doi          = {10.1109/MSP.2018.3111249},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PerrottaH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PriceZTE18,
  author       = {Benjamin Price and
                  Michael Zhivich and
                  Michael Thompson and
                  Chris Eagle},
  title        = {House Rules: Designing the Scoring Algorithm for Cyber Grand Challenge},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {2},
  pages        = {23--31},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1870877},
  doi          = {10.1109/MSP.2018.1870877},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PriceZTE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RashidDCLMLP18,
  author       = {Awais Rashid and
                  George Danezis and
                  Howard Chivers and
                  Emil Lupu and
                  Andrew Martin and
                  Makayla Lewis and
                  Claudia Peersman},
  title        = {Scoping the Cyber Security Body of Knowledge},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {3},
  pages        = {96--102},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.2701150},
  doi          = {10.1109/MSP.2018.2701150},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RashidDCLMLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RoettelerS18,
  author       = {Martin Roetteler and
                  Krysta M. Svore},
  title        = {Quantum Computing: Codebreaking and Beyond},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {5},
  pages        = {22--36},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3761710},
  doi          = {10.1109/MSP.2018.3761710},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RoettelerS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RonenSWO18,
  author       = {Eyal Ronen and
                  Adi Shamir and
                  Achi{-}Or Weingarten and
                  Colin O'Flynn},
  title        = {IoT Goes Nuclear: Creating a Zigbee Chain Reaction},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {1},
  pages        = {54--62},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1331033},
  doi          = {10.1109/MSP.2018.1331033},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RonenSWO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Sasaki18,
  author       = {Masahide Sasaki},
  title        = {Quantum Key Distribution and Its Applications},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {5},
  pages        = {42--48},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3761713},
  doi          = {10.1109/MSP.2018.3761713},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Sasaki18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier18,
  author       = {Bruce Schneier},
  title        = {Artificial Intelligence and the Attack/Defense Balance},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {2},
  pages        = {96},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1870857},
  doi          = {10.1109/MSP.2018.1870857},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier18a,
  author       = {Bruce Schneier},
  title        = {Cryptography after the Aliens Land},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {5},
  pages        = {86--88},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3761724},
  doi          = {10.1109/MSP.2018.3761724},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier18b,
  author       = {Bruce Schneier},
  title        = {Unnoticed Consent [Last Word]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {6},
  pages        = {80--79},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSEC.2018.2882121},
  doi          = {10.1109/MSEC.2018.2882121},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SchraderG18,
  author       = {Dawn E. Schrader and
                  Dipayan P. Ghosh},
  title        = {Proactively Protecting Against the Singularity: Ethical Decision Making
                  in {AI}},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {3},
  pages        = {56--63},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.2701169},
  doi          = {10.1109/MSP.2018.2701169},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SchraderG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Shoshitaishvili18,
  author       = {Yan Shoshitaishvili and
                  Antonio Bianchi and
                  Kevin Borgolte and
                  Amat Cama and
                  Jacopo Corbetta and
                  Francesco Disperati and
                  Andrew Dutcher and
                  John Grosen and
                  Paul Grosen and
                  Aravind Machiry and
                  Christopher Salls and
                  Nick Stephens and
                  Ruoyu Wang and
                  Giovanni Vigna},
  title        = {Mechanical Phish: Resilient Autonomous Hacking},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {2},
  pages        = {12--22},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1870858},
  doi          = {10.1109/MSP.2018.1870858},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Shoshitaishvili18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SilvaBAMVSM18,
  author       = {Paulo Silva and
                  T{\^{a}}nia Basso and
                  Nuno Antunes and
                  Regina Moraes and
                  Marco Vieira and
                  Paulo Sim{\~{o}}es and
                  Edmundo Monteiro},
  title        = {A Europe-Brazil Context for Secure Data Analytics in the Cloud},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {6},
  pages        = {52--60},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSEC.2018.2875326},
  doi          = {10.1109/MSEC.2018.2875326},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SilvaBAMVSM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SloanW18,
  author       = {Robert H. Sloan and
                  Richard Warner},
  title        = {When Is an Algorithm Transparent? Predictive Analytics, Privacy, and
                  Public Policy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {3},
  pages        = {18--25},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.2701166},
  doi          = {10.1109/MSP.2018.2701166},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SloanW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/StahlW18,
  author       = {Bernd Carsten Stahl and
                  David Wright},
  title        = {Ethics and Privacy in {AI} and Big Data: Implementing Responsible
                  Research and Innovation},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {3},
  pages        = {26--33},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.2701164},
  doi          = {10.1109/MSP.2018.2701164},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/StahlW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/StobertCMS18,
  author       = {Elizabeth Stobert and
                  Elizabeta Cavar and
                  Luka Malisa and
                  David M. Sommer},
  title        = {Teaching Authentication as a Life Skill},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {5},
  pages        = {82--85},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3761712},
  doi          = {10.1109/MSP.2018.3761712},
  timestamp    = {Thu, 27 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/StobertCMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SunLS18,
  author       = {Xiaoyan Sun and
                  Peng Liu and
                  Anoop Singhal},
  title        = {Toward Cyberresiliency in the Context of Cloud Computing [Resilient
                  Security]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {6},
  pages        = {71--75},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSEC.2018.2882122},
  doi          = {10.1109/MSEC.2018.2882122},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SunLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/TenePS18,
  author       = {Omer Tene and
                  Jules Polonetsky and
                  Ahmad{-}Reza Sadeghi},
  title        = {Five Freedoms for the Homo Deus},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {3},
  pages        = {15--17},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.2701156},
  doi          = {10.1109/MSP.2018.2701156},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/TenePS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Thompson18,
  author       = {Michael F. Thompson},
  title        = {Effects of a Honeypot on the Cyber Grand Challenge Final Event},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {2},
  pages        = {37--41},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1870870},
  doi          = {10.1109/MSP.2018.1870870},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Thompson18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ThompsonI18,
  author       = {Michael F. Thompson and
                  Cynthia E. Irvine},
  title        = {Individualizing Cybersecurity Lab Exercises with Labtainers},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {2},
  pages        = {91--95},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1870862},
  doi          = {10.1109/MSP.2018.1870862},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ThompsonI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Tziakouris18,
  author       = {Giannis Tziakouris},
  title        = {Cryptocurrencies - {A} Forensic Challenge or Opportunity for Law Enforcement?
                  An {INTERPOL} Perspective},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {4},
  pages        = {92--94},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3111243},
  doi          = {10.1109/MSP.2018.3111243},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Tziakouris18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/VidasLOS18,
  author       = {Timothy Vidas and
                  Per Larsen and
                  Hamed Okhravi and
                  Ahmad{-}Reza Sadeghi},
  title        = {Changing the Game of Software Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {2},
  pages        = {10--11},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1870863},
  doi          = {10.1109/MSP.2018.1870863},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/VidasLOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Wang18,
  author       = {Yang Wang},
  title        = {Inclusive Security and Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {4},
  pages        = {82--87},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3111237},
  doi          = {10.1109/MSP.2018.3111237},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Wang18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/WangL18,
  author       = {Cliff Wang and
                  Zhuo Lu},
  title        = {Cyber Deception: Overview and the Road Ahead},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {2},
  pages        = {80--85},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1870866},
  doi          = {10.1109/MSP.2018.1870866},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/WangL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/WijesekeraBTREW18,
  author       = {Primal Wijesekera and
                  Arjun Baokar and
                  Lynn Tsai and
                  Joel Reardon and
                  Serge Egelman and
                  David A. Wagner and
                  Konstantin Beznosov},
  title        = {Dynamically Regulating Mobile Application Permissions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {1},
  pages        = {64--71},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1331031},
  doi          = {10.1109/MSP.2018.1331031},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/WijesekeraBTREW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/WinklerZE18,
  author       = {Stephanie Winkler and
                  Sherali Zeadally and
                  Katrine Evans},
  title        = {Privacy and Civilian Drone Use: The Need for Further Regulation},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {5},
  pages        = {72--80},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3761721},
  doi          = {10.1109/MSP.2018.3761721},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/WinklerZE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Wisniewski18,
  author       = {Pamela J. Wisniewski},
  title        = {The Privacy Paradox of Adolescent Online Safety: {A} Matter of Risk
                  Prevention or Risk Resilience?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {2},
  pages        = {86--90},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1870874},
  doi          = {10.1109/MSP.2018.1870874},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Wisniewski18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics