![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
IEEE Security & Privacy, Volume 13
Volume 13, Number 1, January - February 2015
- Bill G. Horne:
Umbrellas and Octopuses. 3-5 - Gary McGraw:
Silver Bullet Talks with Brian Krebs. 7-11 - Hilarie Orman, Charles P. Pfleeger:
Mathematics and Physics Build a New Future for Secure Communication [Guest editors' introduction]. 12-13 - Wade Trappe, Richard E. Howard, Robert S. Moore:
Low-Energy Security: Limits and Opportunities in the Internet of Things. 14-21 - David W. Archer, Kurt Rohloff
:
Computing with Data Privacy: Steps toward Realization. 22-29 - Logan O. Mailloux, Michael R. Grimaila, Douglas D. Hodson, Gerald Baumgartner, Colin McLaughlin:
Performance Evaluations of Quantum Key Distribution System Architectures. 30-40 - Ioana Boureanu, Serge Vaudenay:
Challenges in Distance Bounding. 41-48 - Mark T. Maybury:
Toward the Assured Cyberspace Advantage: Air Force Cyber Vision 2025. 49-56 - Ricardo Padilha, Fernando Pedone
:
Confidentiality in the Cloud. 57-60 - Melissa Dark:
Thinking about Cybersecurity. 61-65 - Emil Simion
:
The Relevance of Statistical Tests in Cryptography. 66-70 - Budi Arief
, Mohd Azeem Bin Adzmi, Thomas Gross
:
Understanding Cybercrime from Its Stakeholders' Perspectives: Part 1-Attackers. 71-76 - Rahul Telang
:
Policy Framework for Data Breaches. 77-79 - Daniel E. Geer Jr.:
Less Is More: Saving the Internet from Itself. 80
Volume 13, Number 2, March - April 2015
- Jeremy Epstein:
The Whole Is Less than the Sum of the Parts. 3-5 - Gary McGraw:
Silver Bullet Talks with Whitfield Diffie. 7-10 - Terry Benzel:
An Enduring Symposium for Leading Research in Security and Privacy. 12-13 - Sai Teja Peddinti, Aleksandra Korolova, Elie Bursztein, Geetanjali Sampemane:
Understanding Sensitivity by Analyzing Anonymity [Guest editor's introduction]. 14-21 - Susan Hohenberger, Steven A. Myers, Rafael Pass
, Abhi Shelat:
An Overview of ANONIZE: A Large-Scale Anonymous Survey System. 22-29 - Per Larsen, Stefan Brunthaler
, Michael Franz:
Automatic Software Diversity. 30-37 - Zongwei Zhou, Miao Yu, Virgil D. Gligor:
Dancing with Giants: Wimpy Kernels for On-Demand I/O Isolation. 38-46 - Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, Radu Sion:
Introspections on the Semantic Gap. 48-55 - Mike Bond, Marios O. Choudary
, Steven J. Murdoch
, Sergei P. Skorobogatov, Ross J. Anderson:
Be Prepared: The EMV Preplay Attack. 56-64 - Vincent Lenders
, Axel Tanner, Albert Blarer:
Gaining an Edge in Cyberspace with Advanced Situational Awareness. 65-74 - Melissa Dark, Jelena Mirkovic:
Evaluation Theory and Practice Applied to Cybersecurity Education. 75-80 - Graham Steel:
Automated Proof and Flaw-Finding Tools in Cryptography. 81-83 - Budi Arief
, Mohd Azeem Bin Adzmi:
Understanding Cybercrime from Its Stakeholders' Perspectives: Part 2-Defenders and Victims. 84-88 - Wojciech Mazurczyk, Luca Caviglione
:
Information Hiding as a Challenge for Malware Detection. 89-93 - Sean W. Smith, John S. Erickson
:
Never Mind Pearl Harbor-What about a Cyber Love Canal? 94-98 - Michael Lesk:
Safety Risks-Human Error or Mechanical Failure?: Lessons from Railways. 99-102 - Frederik J. Zuiderveen Borgesius:
Informed Consent: We Can Do Better to Defend Privacy. 103-107 - Bruce Schneier:
The Security Value of Muddling Through. 108
Volume 13, Number 3, May - June 2015
- Susan Landau:
What Was Samsung Thinking? 3-4 - Gary McGraw:
Silver Bullet Talks with L. Jean Camp. 5-7 - Kleanthis Dellios, Dimitrios Papanikas, Despina Polemi:
Information Security Compliance over Intelligent Transport Systems: Is IT Possible? 9-15 - Nir Kshetri:
India's Cybersecurity Landscape: The Roles of the Private Sector and Public-Private Partnership. 16-23 - David A. Basin, Cas Cremers, Kunihiko Miyazaki, Sasa Radomirovic
, Dai Watanabe:
Improving the Security of Cryptographic Protocol Standards. 24-31 - Patricia Arias Cabarcos
, Florina Almenárez
, Rubén Trapero, Daniel Díaz Sánchez
, Andrés Marín López
:
Blended Identity: Pervasive IdM for Continuous Authentication. 32-39 - Hamilton A. Turner, Jules White, Jaime A. Camelio, Christopher Williams
, Brandon Amos, Robert Parker:
Bad Parts: Are Our Manufacturing Systems at Risk of Silent Cyberattacks? 40-47 - Kjell Jørgen Hole:
Diversity Reduces the Impact of Malware. 48-54 - Jeremy Epstein:
Weakness in Depth: A Voting Machine's Demise. 55-58 - Peter Y. A. Ryan
, Steve A. Schneider
, Vanessa Teague:
End-to-End Verifiability in Voting Systems, from Theory to Practice. 59-62 - Jelena Mirkovic, Melissa Dark, Wenliang Du, Giovanni Vigna, Tamara Denning:
Evaluating Cybersecurity Education Interventions: Three Case Studies. 63-69 - Liam M. Mayron:
Biometric Authentication on Mobile Devices. 70-73 - J. Adam Crain, Sergey Bratus:
Bolt-On Security Extensions for Industrial Control System Protocols: A Case Study of DNP3 SAv5. 74-79 - M. Angela Sasse:
Scaring and Bullying People into Security Won't Work. 80-83 - Jonathan Margulies:
A Developer's Guide to Audit Logging. 84-86 - Kat Krol, Sören Preibusch:
Effortless Privacy Negotiations. 88-91 - Steven M. Bellovin:
What a Real Cybersecurity Bill Should Address. 92
Volume 13, Number 4, July - August 2015
- Terry Benzel:
A Strategic Plan for Cybersecurity Research and Development. 3-5 - Gary McGraw:
Silver Bullet Talks with Katie Moussouris. 7-9 - Shari Lawrence Pfleeger:
Learning from Other Disciplines. 10-11 - Denise L. Anthony
, Timothy Stablein, Emily K. Carian
:
Big Brother in the Information Age: Concerns about Government Information Gathering over Time. 12-19 - Julie Steinke, Balca Bolunmez, Laura Fletcher, Vicki Wang, Alan J. Tomassetti, Kristin M. Repchick, Stephen J. Zaccaro, Reeshad S. Dalal, Lois E. Tetrick:
Improving Cybersecurity Incident Response Team Effectiveness Using Teams-Based Research. 20-29 - Bilal Al Sabbagh, Stewart Kowalski:
A Socio-technical Framework for Threat Modeling a Software Supply Chain. 30-39 - Kjell Jørgen Hole:
Toward Anti-fragility: A Malware-Halting Technique. 40-46 - Christos Dimitrakakis
, Aikaterini Mitrokotsa:
Distance-Bounding Protocols: Are You Close Enough? 47-51 - David Gugelmann, Pascal Studerus, Vincent Lenders
, Bernhard Ager:
Can Content-Based Data Loss Prevention Solutions Prevent Data Leakage in Web Traffic? 52-59 - Rohit Tyagi, Tuhin Paul, B. S. Manoj
, B. Thanudas:
Packet Inspection for Unauthorized OS Detection in Enterprises. 60-65 - Jared DeMott:
Bypassing EMET 4.1. 66-72 - John Knight:
The Importance of Security Cases: Proof Is Good, But Not Enough. 73-75 - Michael Lesk:
Ideas Ahead of Their Time: Digital Time Stamping. 76-79 - Jonathan Margulies:
Garage Door Openers: An Internet of Things Case Study. 80-83 - Monica T. Whitty
:
Mass-Marketing Fraud: A Growing Concern. 84-87 - Daniel E. Geer Jr.:
The Right to Be Unobserved. 88
Volume 13, Number 5, September - October 2015
- Robin E. Bloomfield:
Autonomy, Robotics, and Dependability. 3-5 - Gary McGraw:
Silver Bullet Talks with Bart Preneel. 8-10 - Massimo Felici, Nick Wainwright, Fabio Bisogni, Simona Cavallini
:
What's New in the Economics of Cybersecurity?: Observational and Empirical Studies. 12-15 - Hadi Asghari, Michel J. G. van Eeten
, Johannes M. Bauer:
Economics of Fighting Botnets: Lessons from a Decade of Mitigation. 16-23 - Sören Preibusch:
The Value of Web Search Privacy. 24-32 - Tristan Caulfield
, David J. Pym:
Improving Security Policy Decisions with Models. 34-41 - Clementina Bruno
, Luca Guidi, Azahara Lorite-Espejo, Daniela Pestonesi:
Assessing a Potential Cyberattack on the Italian Electric System. 42-51 - Martina de Gramatica, Fabio Massacci
, Woohyun Shim, Alessandra Tedeschi, Julian Williams:
IT Interdependence and the Economic Fairness of Cybersecurity Regulations for Civil Aviation. 52-61 - Zahid Akhtar
, Christian Micheloni
, Gian Luca Foresti:
Biometric Liveness Detection: Challenges and Research Opportunities. 63-72 - Masooda N. Bashir
, April Lambert, Boyi Guo
, Nasir D. Memon
, Tzipora Halevi:
Cybersecurity Competitions: The Human Angle. 74-79 - Katrine Evans:
Vidal-Hall and Risk Management for Privacy Breaches. 80-84 - Gilles Barthe
:
High-Assurance Cryptography: Cryptographic Software We Can Trust. 86-89 - Juhee Kwon
, M. Eric Johnson:
Protecting Patient Data-The Economic Perspective of Healthcare Security. 90-95 - Jonathan Margulies:
Securing Cloud-Based Applications, Part 1. 96-98 - David Modic
, Ross J. Anderson:
It's All Over but the Crying: The Emotional and Financial Impact of Internet Fraud. 99-103 - Daniel E. Geer Jr.:
Children of the Magenta. 104
Volume 13, Number 6, November - December 2015
- Shari Lawrence Pfleeger:
Spider-Man, Hubris, and the Future of Security and Privacy. 3-10 - Gary McGraw:
Silver Bullet Talks with Steven M. Bellovin and Matthew Green. 12-15 - Shari Lawrence Pfleeger:
Lessons Learned by Our Editorial Board. 16-17 - Rolf Oppliger:
Quantitative Risk Analysis in Information Security Management: A Modern Fairy Tale. 18-21 - Charles P. Pfleeger:
Lesson Learned: Security is Inevitable. 22-28 - Valerio Bellandi
, Stelvio Cimato
, Ernesto Damiani
, Gabriele Gianini
, Antonio Zilli:
Toward Economic-Aware Risk Assessment on the Cloud. 30-37 - Per Håkon Meland, Inger Anne Tøndel, Bjørnar Solhaug:
Mitigating Risk with Cyberinsurance. 38-43 - Artemis D. Avgerou, Yannis C. Stamatiou
:
Privacy Awareness Diffusion in Social Networks. 44-50 - Jungwoo Ryoo
, Rick Kazman, Priya Anand:
Architectural Analysis for Security. 52-59 - Rakesh M. Verma
, Murat Kantarcioglu, David J. Marchette, Ernst L. Leiss, Thamar Solorio:
Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students. 60-65 - Jeff Kosseff:
A New Legal Framework for Online Anonymity: California's Privacy-Based Approach. 66-70 - Jia Song, Jim Alves-Foss:
The DARPA Cyber Grand Challenge: A Competitor's Perspective. 72-76 - Atif M. Memon, Ali Anwar:
Colluding Apps: Tomorrow's Mobile Malware Threat. 77-81 - Harold Thimbleby, Ross Koppel
:
The Healthtech Declaration. 82-84 - Michael Lesk:
License Creep. 85-88 - Andrew A. Adams:
Possessing Mobile Devices. 89-95 - Steven M. Bellovin:
The Key to the Key. 96
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.