


default search action
IEEE Security & Privacy, Volume 18
Volume 18, Number 1, January - February 2020
- David M. Nicol

:
The Value of Useless Academic Research to the Cyberdefense of Critical Infrastructures. 4-7 - Kate Charlet, Heather King:

The Future of Cybersecurity Policy. 8-10 - Andrew J. Grotto

:
Deconstructing Cyber Attribution: A Proposed Framework and Lexicon. 12-20 - Daniel W. Woods

, Tyler Moore
:
Does Insurance Have a Future in Governing Cybersecurity? 21-27 - José Luis Hernández-Ramos

, Dimitris Geneiatakis, Ioannis Kounelis, Gary Steri
, Igor Nai Fovino:
Toward a Data-Driven Society: A Technological Perspective on the Development of Cybersecurity and Data-Protection Policies. 28-38 - Michael Klipstein

, Austin Minter, Jeremiah Pittman:
Understanding the Information Environment to Win the Next Conflict Without Firing a Shot. 39-45 - Pierantonia Sterlini

, Fabio Massacci
, Natalia Kadenko
, Tobias Fiebig
, Michel van Eeten
:
Governance Challenges for European Cybersecurity Policies: Stakeholder Views. 46-54 - Barry M. Horowitz

:
Cyberattack-Resilient Cyberphysical Systems. 55-60 - William Stallings

:
Handling of Personal Information and Deidentified, Aggregated, and Pseudonymized Information Under the California Consumer Privacy Act. 61-64 - James P. Howard II

, Maria E. Vachino
:
Blockchain Compliance With Federal Cryptographic Information-Processing Standards. 65-70 - Bruce Schneier:

Technologists vs. Policy Makers. 72-71
Volume 18, Number 2, March - April 2020
- Paul C. van Oorschot

:
Untangling Security and Privacy. 4-6 - Fariborz Farahmand

:
Quantitative Issues in Cyberinsurance: Lessons From Behavioral Economics, Counterfactuals, and Causal Inference. 8-15 - Domhnall Carlin

, Jonah Burgess
, Philip O'Kane
, Sakir Sezer:
You Could Be Mine(d): The Rise of Cryptojacking. 16-22 - Luca Allodi

, Tzouliano Chotza, Ekaterina Panina, Nicola Zannone
:
The Need for New Antiphishing Measures Against Spear-Phishing Attacks. 23-34 - Boubakr Nour

, Kashif Sharif
, Fan Li
, Yu Wang
:
Security and Privacy Challenges in Information-Centric Wireless Internet of Things Networks. 35-45 - Markus Jakobsson

:
Permissions and Privacy. 46-55 - Patrick Jauernig

, Ahmad-Reza Sadeghi, Emmanuel Stapf:
Trusted Execution Environments: Properties, Applications, and Challenges. 56-60 - Thomas R. Souvignet

, Thibaut Heckmann, Timothy Bollé
:
From Lucky Luke to Lock Bits. 61-66 - Denny Pencheva, Joseph Hallett

, Awais Rashid
:
Bringing Cyber to School: Integrating Cybersecurity Into Secondary School Education. 68-74 - Steven M. Bellovin:

Policies on Privacy. 76
Volume 18, Number 3, May - June 2020
- David M. Nicol

:
In the Petri Dish: Cybersecurity Pushed to the Edge. 4-5 - Terry Benzel

, Frank Stajano:
IEEE Euro S&P: The Younger Sibling Across the Pond Following in Oakland's Footsteps. 6-7 - Stefano Calzavara

, Mauro Conti
, Riccardo Focardi
, Alvise Rabitti, Gabriele Tolomei
:
Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery. 8-16 - Fan Zhang

, Warren He, Raymond Cheng, Jernej Kos, Nicholas Hynes, Noah M. Johnson, Ari Juels, Andrew Miller, Dawn Song:
The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts. 17-27 - Guoxing Chen

, Sanchuan Chen, Yuan Xiao
, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai:
SgxPectre: Stealing Intel Secrets From SGX Enclaves via Speculative Execution. 28-37 - Yuan Tian

, Cormac Herley
, Stuart E. Schechter:
StopGuessing: Using Guessed Passwords to Thwart Online Password Guessing. 38-47 - Erik van der Kouwe

, Gernot Heiser
, Dennis Andriesse, Herbert Bos
, Cristiano Giuffrida
:
Benchmarking Flaws Undermine Security Research. 48-57 - Kavita M. Berger

:
Addressing Cyber Threats in Biology. 58-61 - Alexander Kott, Paul Théron:

Doers, Not Watchers: Intelligent Autonomous Agents Are a Path to Cyber Resilience. 62-66 - Elisa Bertino:

The Quest for Data Transparency. 67-68
Volume 18, Number 4, July - August 2020
- Sean Peisert

:
Isolating Insecurely: A Call to Arms for the Security and Privacy Community During the Time of COVID-19. 4-7 - Hamed Okhravi

, Nathan Burow, Richard Skowyra, Bryan C. Ward, Samuel Jero, Roger Khazan, Howard E. Shrobe:
One Giant Leap for Computer Security. 8-19 - Marietheres Dietz

, Günther Pernul:
Unleashing the Digital Twin's Potential for ICS Security. 20-27 - L. Jean Camp, Ryan Henry

, Tadayoshi Kohno
, Shrirang Mare
, Steven A. Myers, Shwetak N. Patel
, Joshua Streiff:
Toward a Secure Internet of Things: Directions for Research. 28-37 - Behnood Momenzadeh

, Helen Dougherty, Matthew Remmel, Steven A. Myers, L. Jean Camp:
Best Practices Would Make Things Better in the IoT. 38-47 - Inger Anne Tøndel

, Martin Gilje Jaatun, Daniela Soares Cruzes:
IT Security Is From Mars, Software Security Is From Venus. 48-54 - Khaled El Emam

:
Seven Ways to Evaluate the Utility of Synthetic Data. 56-59 - Dan Shoemaker, Nancy R. Mead

, Anne Kohnke:
Teaching Secure Acquisition in Higher Education. 60-66 - Eric Osterweil

:
A Cybersecurity Terminarch: Use It Before We Lose It. 67-70 - Holger Mack

, Tom Schroer:
Security Midlife Crisis: Building Security in a New World. 72-74 - Daniel E. Geer Jr.:

Security Theater, the Beat Goes On. 75-76
Volume 18, Number 5, September - October 2020
- Paul C. van Oorschot

:
Blockchains and Stealth Tactics for Teaching Security. 3-5 - Mohammad Mannan, N. Asokan

:
Confronting the Limitations of Hardware-Assisted Security. 6-7 - Lianying Zhao

, David Lie:
Is Hardware More Secure Than Software? 8-17 - Michael Schwarz, Daniel Gruss

:
How Trusted Execution Environments Fuel Research on Microarchitectural Attacks. 18-27 - Kit Murdock

, David F. Oswald
, Flavio D. Garcia, Jo Van Bulck
, Frank Piessens
, Daniel Gruss
:
Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble. 28-37 - Kari Kostiainen

, Aritra Dhar
, Srdjan Capkun:
Dedicated Security Chips in the Age of Secure Enclaves. 38-46 - David Kohlbrenner, Shweta Shinde

, Dayeol Lee, Krste Asanovic, Dawn Song:
Building Open Trusted Execution Environments. 47-56 - Ghada Dessouky

, Tommaso Frassetto, Patrick Jauernig
, Ahmad-Reza Sadeghi, Emmanuel Stapf:
With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security. 57-66 - Randy Borum

, Ron Sanders:
Preparing America's Cyber Intelligence Workforce. 67-73 - Kenneth G. Crowther

, Brian Rust:
Built-In Cybersecurity: Insights Into Product Security for Cyberphysical Systems at a Large Company. 74-79 - Bruce Schneier:

Hacking the Tax Code. 79-80
Volume 18, Number 6, November - December 2020
- Phyllis A. Schneck:

Cybersecurity During COVID-19. 4-5 - Feng Hao

, Shen Wang, Samiran Bag
, Rob Procter
, Siamak F. Shahandashti
, Maryam Mehrnezhad
, Ehsan Toreini
, Roberto Metere, Lana Y. J. Liu:
End-to-End Verifiable E-Voting Trial for Polling Station Voting. 6-13 - Chuadhry Mujeeb Ahmed

, Jianying Zhou
:
Challenges and Opportunities in Cyberphysical Systems Security: A Physics-Based Perspective. 14-22 - Rafael Padilha, Caroline Mazini Rodrigues

, Fernanda A. Andaló
, Gabriel Bertocco, Zanoni Dias
, Anderson Rocha
:
Forensic Event Analysis: From Seemingly Unrelated Data to Understanding. 23-32 - Roy A. Maxion

:
Reproducibility: Buy Low, Sell High. 33-41 - Qiu-Hong Wang

, Steven M. Miller
, Robert H. Deng
:
Driving Cybersecurity Policy Insights From Information on the Internet. 42-50 - Rock Stevens

, Josiah Dykstra, Wendy Knox Everette, Michelle L. Mazurek:
It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs. 51-58 - Julianna Rodríguez

, Benjamin J. Allison, Christopher Apsey, Todd Boudreau:
Courseware as Code: Instituting Agile Courseware Collaboration. 59-62 - Steven M. Bellovin:

Security, Privacy, and Scale. 63-64

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














