Search dblp for Publications

export results for "toc:db/journals/ieeesp/ieeesp17.bht:"

 download as .bib file

@article{DBLP:journals/ieeesp/AbramsACG19,
  author       = {Martin Abrams and
                  John Abrams and
                  Peter Cullen and
                  Lynn Goldstein},
  title        = {Artificial Intelligence, Ethics, and Enhanced Data Stewardship},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {2},
  pages        = {17--30},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2018.2888778},
  doi          = {10.1109/MSEC.2018.2888778},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AbramsACG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Al-RubaieC19,
  author       = {Mohammad Al{-}Rubaie and
                  J. Morris Chang},
  title        = {Privacy-Preserving Machine Learning: Threats and Solutions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {2},
  pages        = {49--58},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2018.2888775},
  doi          = {10.1109/MSEC.2018.2888775},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Al-RubaieC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ArbuckleR19,
  author       = {Luk Arbuckle and
                  Felix Ritchie},
  title        = {The Five Safes of Risk-Based Anonymization},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {5},
  pages        = {84--89},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2929282},
  doi          = {10.1109/MSEC.2019.2929282},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ArbuckleR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/AxenopoulosEPKM19,
  author       = {Apostolos Axenopoulos and
                  Volker Eiselein and
                  Antonio Penta and
                  Eugenia Koblents and
                  Ernesto La Mattina and
                  Petros Daras},
  title        = {A Framework for Large-Scale Analysis of Video "in the Wild" to Assist
                  Digital Forensic Examination},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {1},
  pages        = {23--33},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2018.2875851},
  doi          = {10.1109/MSEC.2018.2875851},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AxenopoulosEPKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BaddarMM19,
  author       = {Sherenaz W. Al{-}Haj Baddar and
                  Alessio Merlo and
                  Mauro Migliardi},
  title        = {Behavioral-Anomaly Detection in Forensics Analysis},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {1},
  pages        = {55--62},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2894917},
  doi          = {10.1109/MSEC.2019.2894917},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BaddarMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BalliuBS19,
  author       = {Musard Balliu and
                  Iulia Bastys and
                  Andrei Sabelfeld},
  title        = {Securing IoT Apps},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {5},
  pages        = {22--29},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2914190},
  doi          = {10.1109/MSEC.2019.2914190},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BalliuBS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BarthHJM19,
  author       = {Susanne Barth and
                  Pieter H. Hartel and
                  Marianne Junger and
                  Lorena Montoya},
  title        = {Teaching Empirical Social-Science Research to Cybersecurity Students:
                  The Case of {\textbackslash}"Thinking Like a Thief{\textbackslash}"},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {3},
  pages        = {8--16},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2018.2888781},
  doi          = {10.1109/MSEC.2018.2888781},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BarthHJM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BartoliniLR19,
  author       = {Cesare Bartolini and
                  Gabriele Lenzini and
                  Livio Robaldo},
  title        = {The DAta Protection REgulation COmpliance Model},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {6},
  pages        = {37--45},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2937756},
  doi          = {10.1109/MSEC.2019.2937756},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BartoliniLR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BatesH19,
  author       = {Adam Bates and
                  Wajih Ul Hassan},
  title        = {Can Data Provenance Put an End to the Data Breach?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {4},
  pages        = {88--93},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2913693},
  doi          = {10.1109/MSEC.2019.2913693},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BatesH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BeguinBCJLNRTTA19,
  author       = {Erwan Beguin and
                  Solal Besnard and
                  Adrien Cros and
                  Barbara Joannes and
                  Ombeline Leclerc{-}Istria and
                  Alexa Noel and
                  Nicolas Roels and
                  Faical Taleb and
                  Jean Thongphan and
                  Eric Alata and
                  Vincent Nicomette},
  title        = {Computer-Security-Oriented Escape Room},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {4},
  pages        = {78--83},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2912700},
  doi          = {10.1109/MSEC.2019.2912700},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BeguinBCJLNRTTA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin19,
  author       = {Steven M. Bellovin},
  title        = {Layered Insecurity},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {3},
  pages        = {96--95},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2906807},
  doi          = {10.1109/MSEC.2019.2906807},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bertino19,
  author       = {Elisa Bertino},
  title        = {It Takes a Village to Secure Cellular Networks},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {5},
  pages        = {96--95},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2922867},
  doi          = {10.1109/MSEC.2019.2922867},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bertino19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BonehGMP19,
  author       = {Dan Boneh and
                  Andrew J. Grotto and
                  Patrick D. McDaniel and
                  Nicolas Papernot},
  title        = {How Relevant Is the Turing Test in the Age of Sophisbots?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {6},
  pages        = {64--71},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2934193},
  doi          = {10.1109/MSEC.2019.2934193},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BonehGMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BreidenbachDTJ19,
  author       = {Lorenz Breidenbach and
                  Philip Daian and
                  Florian Tram{\`{e}}r and
                  Ari Juels},
  title        = {The Hydra Framework for Principled, Automated Bug Bounties},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {4},
  pages        = {53--61},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2914109},
  doi          = {10.1109/MSEC.2019.2914109},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BreidenbachDTJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CarvalhoGC19,
  author       = {Rodrigo Carvalho and
                  Michael Goldsmith and
                  Sadie Creese},
  title        = {Investigating Malware Campaigns With Semantic Technologies},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {1},
  pages        = {43--54},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2018.2875878},
  doi          = {10.1109/MSEC.2018.2875878},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CarvalhoGC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CelikMTBU19,
  author       = {Z. Berkay Celik and
                  Patrick D. McDaniel and
                  Gang Tan and
                  Leonardo Babun and
                  A. Selcuk Uluagac},
  title        = {Verifying Internet of Things Safety and Security in Physical Spaces},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {5},
  pages        = {30--37},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2911511},
  doi          = {10.1109/MSEC.2019.2911511},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CelikMTBU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CulnaneELPT19,
  author       = {Chris Culnane and
                  Aleksander Essex and
                  Sarah Jamie Lewis and
                  Olivier Pereira and
                  Vanessa Teague},
  title        = {Knights and Knaves Run Elections: Internet Voting and Undetectable
                  Electoral Fraud},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {4},
  pages        = {62--70},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2915398},
  doi          = {10.1109/MSEC.2019.2915398},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CulnaneELPT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/EnckB19,
  author       = {William Enck and
                  Terry Benzel},
  title        = {Selected Papers From the 2018 {USENIX} Security Symposium},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {4},
  pages        = {7--8},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2915397},
  doi          = {10.1109/MSEC.2019.2915397},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/EnckB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Epstein19,
  author       = {Jeremy Epstein},
  title        = {A Horse's Rump and Cybersecurity},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {4},
  pages        = {4--6},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2916238},
  doi          = {10.1109/MSEC.2019.2916238},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Epstein19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/FasanoLDB19,
  author       = {Andrew Fasano and
                  Tim Leek and
                  Brendan Dolan{-}Gavitt and
                  Josh Bundt},
  title        = {The Rode0day to Less-Buggy Programs},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {6},
  pages        = {84--88},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2933682},
  doi          = {10.1109/MSEC.2019.2933682},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/FasanoLDB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/FrankenGJ19,
  author       = {Gertjan Franken and
                  Tom van Goethem and
                  Wouter Joosen},
  title        = {Exposing Cookie Policy Flaws Through an Extensive Evaluation of Browsers
                  and Their Extensions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {4},
  pages        = {25--34},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2909710},
  doi          = {10.1109/MSEC.2019.2909710},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/FrankenGJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Geer19,
  author       = {Daniel E. Geer Jr.},
  title        = {Unknowable Unknowns},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {2},
  pages        = {80--79},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2898636},
  doi          = {10.1109/MSEC.2019.2898636},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Geer19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Geer19a,
  author       = {Daniel E. Geer Jr.},
  title        = {Ownership},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {4},
  pages        = {100--99},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2914845},
  doi          = {10.1109/MSEC.2019.2914845},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Geer19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GeerP19,
  author       = {Daniel E. Geer Jr. and
                  Dale Peterson},
  title        = {Failure as Design},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {6},
  pages        = {89--90},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2936706},
  doi          = {10.1109/MSEC.2019.2936706},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GeerP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Gladyshev19,
  author       = {Pavel Gladyshev},
  title        = {Cybercrime as a Consequence of Unreasonable Expectations},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {4},
  pages        = {84--87},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2913772},
  doi          = {10.1109/MSEC.2019.2913772},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Gladyshev19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Herardian19,
  author       = {Ron Herardian},
  title        = {The Soft Underbelly of Cloud Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {3},
  pages        = {90--93},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2904112},
  doi          = {10.1109/MSEC.2019.2904112},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Herardian19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/HernandezFTYTB19,
  author       = {Grant Hernandez and
                  Farhaan Fowze and
                  Dave Jing Tian and
                  Tuba Yavuz and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  title        = {Toward Automated Firmware Analysis in the IoT Era},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {5},
  pages        = {38--46},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2926462},
  doi          = {10.1109/MSEC.2019.2926462},
  timestamp    = {Sat, 11 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/HernandezFTYTB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Horsman19,
  author       = {Graeme Horsman},
  title        = {A Call for the Prohibition of Encryption: Panacea or Problem?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {2},
  pages        = {59--66},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2018.2888776},
  doi          = {10.1109/MSEC.2018.2888776},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Horsman19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Jakobsson19,
  author       = {Markus Jakobsson},
  title        = {The Rising Threat of Launchpad Attacks},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {5},
  pages        = {68--72},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2922865},
  doi          = {10.1109/MSEC.2019.2922865},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Jakobsson19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/JalaliKSM19,
  author       = {Mohammad S. Jalali and
                  Jessica P. Kaiser and
                  Michael D. Siegel and
                  Stuart E. Madnick},
  title        = {The Internet of Things Promises New Benefits and Risks: {A} Systematic
                  Analysis of Adoption Dynamics of IoT Products},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {2},
  pages        = {39--48},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2018.2888780},
  doi          = {10.1109/MSEC.2018.2888780},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/JalaliKSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Kobeissi19,
  author       = {Nadim Kobeissi},
  title        = {Selfie?s Reflections on Formal Verification for Transport Layer Security
                  1.3: Largely Opaque},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {4},
  pages        = {94--96},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2913027},
  doi          = {10.1109/MSEC.2019.2913027},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Kobeissi19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KumarPMHMBB19,
  author       = {Deepak Kumar and
                  Riccardo Paccagnella and
                  Paul Murley and
                  Eric Hennenfent and
                  Joshua Mason and
                  Adam Bates and
                  Michael D. Bailey},
  title        = {Emerging Threats in Internet of Things Voice Services},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {4},
  pages        = {18--24},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2910013},
  doi          = {10.1109/MSEC.2019.2910013},
  timestamp    = {Mon, 20 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KumarPMHMBB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KyriazanosTT19,
  author       = {Dimitris M. Kyriazanos and
                  Konstantinos Giorgos Thanos and
                  Stelios C. A. Thomopoulos},
  title        = {Automated Decision Making in Airport Checkpoints: Bias Detection Toward
                  Smarter Security and Fairness},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {2},
  pages        = {8--16},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2018.2888777},
  doi          = {10.1109/MSEC.2018.2888777},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KyriazanosTT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LeonKZRAZ19,
  author       = {Roee Leon and
                  Michael Kiperberg and
                  Anat Anatey Leon Zabag and
                  Amit Resh and
                  Asaf Algawi and
                  Nezer J. Zaidenberg},
  title        = {Hypervisor-Based White Listing of Executables},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {5},
  pages        = {58--67},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2910218},
  doi          = {10.1109/MSEC.2019.2910218},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LeonKZRAZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LindenZHCR19,
  author       = {Dirk van der Linden and
                  Anna Zamansky and
                  Irit Hadar and
                  Barnaby Craggs and
                  Awais Rashid},
  title        = {Buddy's Wearable Is Not Your Buddy: Privacy Implications of Pet Wearables},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {3},
  pages        = {28--39},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2018.2888783},
  doi          = {10.1109/MSEC.2018.2888783},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LindenZHCR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LinkovBFGLPRRST19,
  author       = {Igor Linkov and
                  Fabrizio Baiardi and
                  Marie{-}Valentine Florin and
                  Scott Greer and
                  James H. Lambert and
                  Miriam Pollock and
                  Jean{-}Marc Rickli and
                  Lada Roslycky and
                  Thomas P. Seager and
                  Heimir Thorisson and
                  Benjamin D. Trump},
  title        = {Applying Resilience to Hybrid Threats},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {5},
  pages        = {78--83},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2922866},
  doi          = {10.1109/MSEC.2019.2922866},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LinkovBFGLPRRST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MaiorcaB19,
  author       = {Davide Maiorca and
                  Battista Biggio},
  title        = {Digital Investigation of {PDF} Files: Unveiling Traces of Embedded
                  Malware},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {1},
  pages        = {63--71},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2018.2875879},
  doi          = {10.1109/MSEC.2018.2875879},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MaiorcaB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Massacci19,
  author       = {Fabio Massacci},
  title        = {Is "Deny Access" a Valid "Fail-Safe Default" Principle for Building
                  Security in Cyberphysical Systems?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {5},
  pages        = {90--93},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2918820},
  doi          = {10.1109/MSEC.2019.2918820},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Massacci19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Matheu-GarciaRS19,
  author       = {Sara Nieves Matheu{-}Garc{\'{\i}}a and
                  Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and
                  Antonio F. Skarmeta},
  title        = {Toward a Cybersecurity Certification Framework for the Internet of
                  Things},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {3},
  pages        = {66--76},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2904475},
  doi          = {10.1109/MSEC.2019.2904475},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Matheu-GarciaRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MazurczykCW19,
  author       = {Wojciech Mazurczyk and
                  Luca Caviglione and
                  Steffen Wendzel},
  title        = {Recent Advancements in Digital Forensics, Part 2},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {1},
  pages        = {7--8},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2896857},
  doi          = {10.1109/MSEC.2019.2896857},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MazurczykCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Michael19,
  author       = {James Bret Michael},
  title        = {Trustworthiness of Autonomous Machines in Armed Conflict},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {6},
  pages        = {4--6},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2938195},
  doi          = {10.1109/MSEC.2019.2938195},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Michael19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MomenHF19,
  author       = {Nurul Momen and
                  Majid Hatamian and
                  Lothar Fritsch},
  title        = {Did App Privacy Improve After the GDPR?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {6},
  pages        = {10--20},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2938445},
  doi          = {10.1109/MSEC.2019.2938445},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MomenHF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/NestlerCA19,
  author       = {Vincent Nestler and
                  Tony Coulson and
                  James D. Ashley III},
  title        = {The {NICE} Challenge Project: Providing Workforce Experience Before
                  the Workforce},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {2},
  pages        = {73--78},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2018.2888784},
  doi          = {10.1109/MSEC.2018.2888784},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/NestlerCA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Oorschot19,
  author       = {Paul C. van Oorschot},
  title        = {Software Security and Systematizing Knowledge},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {3},
  pages        = {4--6},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2904127},
  doi          = {10.1109/MSEC.2019.2904127},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Oorschot19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/OorschotS19,
  author       = {Paul C. van Oorschot and
                  Sean W. Smith},
  title        = {The Internet of Things: Security Challenges},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {5},
  pages        = {7--9},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2925918},
  doi          = {10.1109/MSEC.2019.2925918},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/OorschotS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Payer19,
  author       = {Mathias Payer},
  title        = {The Fuzzing Hype-Train: How Random Testing Triggers Thousands of Crashes},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {1},
  pages        = {78--82},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2018.2889892},
  doi          = {10.1109/MSEC.2018.2889892},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Payer19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Peisert19,
  author       = {Sean Peisert},
  title        = {Some Experiences in Developing Security Technology That Actually Get
                  Used},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {2},
  pages        = {4--7},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2899711},
  doi          = {10.1109/MSEC.2019.2899711},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Peisert19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Petrlic19,
  author       = {Ronald Petrlic},
  title        = {The General Data Protection Regulation: From a Data Protection Authority's
                  (Technical) Perspective},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {6},
  pages        = {31--36},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2935701},
  doi          = {10.1109/MSEC.2019.2935701},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Petrlic19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Phillips19,
  author       = {Andelka M. Phillips},
  title        = {Buying Your Genetic Self Online: Pitfalls and Potential Reforms in
                  {DNA} Testing},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {3},
  pages        = {77--81},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2904128},
  doi          = {10.1109/MSEC.2019.2904128},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Phillips19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Raaijmakers19,
  author       = {Stephan Raaijmakers},
  title        = {Artificial Intelligence for Law Enforcement: Challenges and Opportunities},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {5},
  pages        = {74--77},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2925649},
  doi          = {10.1109/MSEC.2019.2925649},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Raaijmakers19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RiaziRK19,
  author       = {M. Sadegh Riazi and
                  Bita Darvish Rouhani and
                  Farinaz Koushanfar},
  title        = {Deep Learning on Private Data},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {6},
  pages        = {54--63},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2935666},
  doi          = {10.1109/MSEC.2019.2935666},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RiaziRK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RicciBB19,
  author       = {Joseph Ricci and
                  Ibrahim M. Baggili and
                  Frank Breitinger},
  title        = {Blockchain-Based Distributed Cloud Storage Digital Forensics: Where's
                  the Beef?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {1},
  pages        = {34--42},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2018.2875877},
  doi          = {10.1109/MSEC.2018.2875877},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RicciBB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RouaniSJK19,
  author       = {Bita Darvish Rouhani and
                  Mohammad Samragh and
                  Tara Javidi and
                  Farinaz Koushanfar},
  title        = {Safe Machine Learning and Defeating Adversarial Attacks},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {2},
  pages        = {31--38},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2018.2888779},
  doi          = {10.1109/MSEC.2018.2888779},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RouaniSJK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RuotiS19,
  author       = {Scott Ruoti and
                  Kent E. Seamons},
  title        = {Johnny's Journey Toward Usable Secure Email},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {6},
  pages        = {72--76},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2933683},
  doi          = {10.1109/MSEC.2019.2933683},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RuotiS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SambasivanABBCG19,
  author       = {Nithya Sambasivan and
                  Nova Ahmed and
                  Amna Batool and
                  Elie Bursztein and
                  Elizabeth F. Churchill and
                  Laura Sanely Gayt{\'{a}}n{-}Lugo and
                  Tara Matthews and
                  David Nemer and
                  Kurt Thomas and
                  Sunny Consolvo},
  title        = {Toward Gender-Equitable Privacy and Security in South Asia},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {4},
  pages        = {71--77},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2912727},
  doi          = {10.1109/MSEC.2019.2912727},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SambasivanABBCG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ScaifePT19,
  author       = {Nolen Scaife and
                  Christian Peeters and
                  Patrick Traynor},
  title        = {More Cowbell: Lessons Learned in Developing the Skim Reaper},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {4},
  pages        = {10--17},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2914017},
  doi          = {10.1109/MSEC.2019.2914017},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ScaifePT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneck19,
  author       = {Phyllis A. Schneck},
  title        = {Cybersecurity Compliance Is Necessary but Not Sufficient: Bad Guys
                  Don't Follow Laws},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {1},
  pages        = {4--6},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2897041},
  doi          = {10.1109/MSEC.2019.2897041},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneck19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SchneiderMJMC19,
  author       = {Moritz Schneider and
                  Sinisa Matetic and
                  Ari Juels and
                  Andrew Miller and
                  Srdjan Capkun},
  title        = {Secure Brokered Delegation Through DelegaTEE},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {4},
  pages        = {43--52},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2909712},
  doi          = {10.1109/MSEC.2019.2909712},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SchneiderMJMC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier19,
  author       = {Bruce Schneier},
  title        = {Cybersecurity for the Public Interest},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {1},
  pages        = {84--83},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2018.2889891},
  doi          = {10.1109/MSEC.2018.2889891},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ShermanDBCSVVOG19,
  author       = {Alan T. Sherman and
                  Josiah Dykstra and
                  Gregory V. Bard and
                  Ankur Chattopadhyay and
                  Filipo Sharevski and
                  Rakesh M. Verma and
                  Ryan Vrecenar and
                  Linda Oliva and
                  Enis Golaszewski and
                  Dhananjay S. Phatak and
                  Travis Scheponik and
                  Geoffrey L. Herman and
                  Dong San Choi and
                  Spencer E. Offenberger and
                  Peter Peterson},
  title        = {The {CATS} Hackathon: Creating and Refining Test Items for Cybersecurity
                  Concept Inventories},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {6},
  pages        = {77--83},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2929812},
  doi          = {10.1109/MSEC.2019.2929812},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ShermanDBCSVVOG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ShermanJZG19,
  author       = {Alan T. Sherman and
                  Farid Javani and
                  Haibin Zhang and
                  Enis Golaszewski},
  title        = {On the Origins and Variations of Blockchain Technologies},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {1},
  pages        = {72--77},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2893730},
  doi          = {10.1109/MSEC.2019.2893730},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ShermanJZG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ShermanPGLGKMRS19,
  author       = {Alan T. Sherman and
                  Peter A. H. Peterson and
                  Enis Golaszewski and
                  Edward LaFemina and
                  Ethan Goldschen and
                  Mohammed Khan and
                  Lauren Mundy and
                  Mykah Rather and
                  Bryan Solis and
                  Wubnyonga Tete and
                  Edwin Valdez and
                  Brian Weber and
                  Damian Doyle and
                  Casey O'Brien and
                  Linda Oliva and
                  Joseph Roundy and
                  Jack Suess},
  title        = {Project-Based Learning Inspires Cybersecurity Students: {A} Scholarship-for-Service
                  Research Study},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {3},
  pages        = {82--88},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2900595},
  doi          = {10.1109/MSEC.2019.2900595},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ShermanPGLGKMRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SiegelS19,
  author       = {Joshua Siegel and
                  Sanjay E. Sarma},
  title        = {A Cognitive Protection System for the Internet of Things},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {3},
  pages        = {40--48},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2018.2884860},
  doi          = {10.1109/MSEC.2018.2884860},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SiegelS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SiegelS19a,
  author       = {Joshua Eric Siegel and
                  Sanjay E. Sarma},
  title        = {Using Open Channels to Trigger the Invited, Unintended Consequences
                  of the Internet of Things},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {3},
  pages        = {49--55},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2901430},
  doi          = {10.1109/MSEC.2019.2901430},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SiegelS19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SinghC19,
  author       = {Jatinder Singh and
                  Jennifer Cobbe},
  title        = {The Security Implications of Data Subject Rights},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {6},
  pages        = {21--30},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2914614},
  doi          = {10.1109/MSEC.2019.2914614},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SinghC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SinglaB19,
  author       = {Ankush Singla and
                  Elisa Bertino},
  title        = {How Deep Learning Is Making Information Security More Intelligent},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {3},
  pages        = {56--65},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2902347},
  doi          = {10.1109/MSEC.2019.2902347},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SinglaB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/StevensVRAM19,
  author       = {Rock Stevens and
                  Daniel Votipka and
                  Elissa M. Redmiles and
                  Colin Ahern and
                  Michelle L. Mazurek},
  title        = {Applied Digital Threat Modeling: It Works},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {4},
  pages        = {35--42},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2909714},
  doi          = {10.1109/MSEC.2019.2909714},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/StevensVRAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/TeneEGMZ19,
  author       = {Omer Tene and
                  Katrine Evans and
                  Bruno Gencarelli and
                  Gabe Maldoff and
                  Gabriela Zanfir{-}Fortuna},
  title        = {{GDPR} at Year One: Enter the Designers and Engineers},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {6},
  pages        = {7--9},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2938196},
  doi          = {10.1109/MSEC.2019.2938196},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/TeneEGMZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/TianCJHNC19,
  author       = {Hui Tian and
                  Yuxiang Chen and
                  Hong Jiang and
                  Yongfeng Huang and
                  Fulin Nan and
                  Yonghong Chen},
  title        = {Public Auditing for Trusted Cloud Storage Services},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {1},
  pages        = {10--22},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2018.2875880},
  doi          = {10.1109/MSEC.2018.2875880},
  timestamp    = {Wed, 10 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/TianCJHNC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/TothA19,
  author       = {Kalman C. Toth and
                  Alan Anderson{-}Priddy},
  title        = {Self-Sovereign Digital Identity: {A} Paradigm Shift for Identity},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {3},
  pages        = {17--27},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2018.2888782},
  doi          = {10.1109/MSEC.2018.2888782},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/TothA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/TschofenigB19,
  author       = {Hannes Tschofenig and
                  Emmanuel Baccelli},
  title        = {Cyberphysical Security for the Masses: {A} Survey of the Internet
                  Protocol Suite for Internet of Things Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {5},
  pages        = {47--57},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2923973},
  doi          = {10.1109/MSEC.2019.2923973},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/TschofenigB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ValenteWC19,
  author       = {Junia Valente and
                  Matthew Wynn and
                  Alvaro A. C{\'{a}}rdenas},
  title        = {Stealing, Spying, and Abusing: Consequences of Attacks on Internet
                  of Things Devices},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {5},
  pages        = {10--21},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2924167},
  doi          = {10.1109/MSEC.2019.2924167},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ValenteWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Williams19,
  author       = {Laurie A. Williams},
  title        = {Science Leaves Clues},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {5},
  pages        = {4--6},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2925648},
  doi          = {10.1109/MSEC.2019.2925648},
  timestamp    = {Mon, 07 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Williams19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/YenerG19,
  author       = {B{\"{u}}lent Yener and
                  Tsvi Gal},
  title        = {Cybersecurity in the Era of Data Science: Examining New Adversarial
                  Models},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {6},
  pages        = {46--53},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2907097},
  doi          = {10.1109/MSEC.2019.2907097},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/YenerG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ZouS19,
  author       = {Yixin Zou and
                  Florian Schaub},
  title        = {Beyond Mandatory: Making Data Breach Notifications Useful for Consumers},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {2},
  pages        = {67--72},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2897834},
  doi          = {10.1109/MSEC.2019.2897834},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ZouS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics