Search dblp for Publications

export results for "toc:db/journals/ieeesp/ieeesp12.bht:"

 download as .bib file

@article{DBLP:journals/ieeesp/BalebakoC14,
  author       = {Rebecca Balebako and
                  Lorrie Faith Cranor},
  title        = {Improving App Privacy: Nudging App Developers to Protect User Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {55--58},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.70},
  doi          = {10.1109/MSP.2014.70},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BalebakoC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BarretoGCMQ14,
  author       = {Carlos A. Barreto and
                  Jairo Alonso Giraldo and
                  Alvaro A. C{\'{a}}rdenas and
                  Eduardo Mojica{-}Nava and
                  Nicanor Quijano},
  title        = {Control Systems for the Power Grid and Their Resiliency to Attacks},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {15--23},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.111},
  doi          = {10.1109/MSP.2014.111},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BarretoGCMQ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BauerH14,
  author       = {Todd Bauer and
                  Jason R. Hamlet},
  title        = {Physical Unclonable Functions: {A} Primer},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {97--101},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.123},
  doi          = {10.1109/MSP.2014.123},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BauerH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin14,
  author       = {Steven M. Bellovin},
  title        = {Dr. Strangecode},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {88},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.42},
  doi          = {10.1109/MSP.2014.42},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin14a,
  author       = {Steven M. Bellovin},
  title        = {By Any Means Possible: How Intelligence Agencies Have Gotten Their
                  Data},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {80--84},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.63},
  doi          = {10.1109/MSP.2014.63},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin14b,
  author       = {Steven M. Bellovin},
  title        = {What Should Crypto Look Like?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {108},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.131},
  doi          = {10.1109/MSP.2014.131},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Benzel14,
  author       = {Terry Benzel},
  title        = {A Symposium, a Magazine, and a Community},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {13--14},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.39},
  doi          = {10.1109/MSP.2014.39},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Benzel14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BeuhringS14,
  author       = {Aaron Beuhring and
                  Kyle Salous},
  title        = {Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent
                  Threats},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {5},
  pages        = {90--93},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.86},
  doi          = {10.1109/MSP.2014.86},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BeuhringS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BhattMZ14,
  author       = {Sandeep N. Bhatt and
                  Pratyusa K. Manadhata and
                  Loai Zomlot},
  title        = {The Operational Role of Security Information and Event Management
                  Systems},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {5},
  pages        = {35--41},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.103},
  doi          = {10.1109/MSP.2014.103},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BhattMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BhattacharyaYGQY14,
  author       = {Prabir Bhattacharya and
                  Li Yang and
                  Minzhe Guo and
                  Kai Qian and
                  Ming Yang},
  title        = {Learning Mobile Security with Labware},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {1},
  pages        = {69--72},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.6},
  doi          = {10.1109/MSP.2014.6},
  timestamp    = {Fri, 06 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BhattacharyaYGQY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BonebrakeO14,
  author       = {Christopher A. Bonebrake and
                  Lori Ross O'Neil},
  title        = {Attacks on {GPS} Time Reliability},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {82--84},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.40},
  doi          = {10.1109/MSP.2014.40},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BonebrakeO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BratusDLPSS14,
  author       = {Sergey Bratus and
                  Trey Darley and
                  Michael E. Locasto and
                  Meredith L. Patterson and
                  Rebecca Shapiro and
                  Anna Shubina},
  title        = {Beyond Planted Bugs in "Trusting Trust": The Input-Processing Frontier},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {1},
  pages        = {83--87},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.1},
  doi          = {10.1109/MSP.2014.1},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BratusDLPSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BrozM14,
  author       = {Milan Broz and
                  Vashek Matyas},
  title        = {The TrueCrypt On-Disk Format-An Independent View},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {74--77},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.60},
  doi          = {10.1109/MSP.2014.60},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BrozM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Candea14,
  author       = {George Candea},
  title        = {The Tests-versus-Proofs Conundrum},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {1},
  pages        = {65--68},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.18},
  doi          = {10.1109/MSP.2014.18},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Candea14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CaputoPFJ14,
  author       = {Deanna D. Caputo and
                  Shari Lawrence Pfleeger and
                  Jesse D. Freeman and
                  M. Eric Johnson},
  title        = {Going Spear Phishing: Exploring Embedded Training and Awareness},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {1},
  pages        = {28--38},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.106},
  doi          = {10.1109/MSP.2013.106},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CaputoPFJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CarvalhoDFW14,
  author       = {Marco M. Carvalho and
                  Jared DeMott and
                  Richard Ford and
                  David A. Wheeler},
  title        = {Heartbleed 101},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {63--67},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.66},
  doi          = {10.1109/MSP.2014.66},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CarvalhoDFW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CarvalhoF14,
  author       = {Marco M. Carvalho and
                  Richard Ford},
  title        = {Moving-Target Defenses for Computer Networks},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {2},
  pages        = {73--76},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.30},
  doi          = {10.1109/MSP.2014.30},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CarvalhoF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ChenSZDTG14,
  author       = {Tiffani R. Chen and
                  Daniel B. Shore and
                  Stephen J. Zaccaro and
                  Reeshad S. Dalal and
                  Lois E. Tetrick and
                  Aiva K. Gorab},
  title        = {An Organizational Psychology Perspective to Examining Computer Security
                  Incident Response Teams},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {5},
  pages        = {61--67},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.85},
  doi          = {10.1109/MSP.2014.85},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ChenSZDTG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ClarkSSH14,
  author       = {Kas Clark and
                  Don Stikvoort and
                  Eelco Stofbergen and
                  Elly van den Heuvel},
  title        = {A Dutch Approach to Cybersecurity through Participation},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {5},
  pages        = {27--34},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.83},
  doi          = {10.1109/MSP.2014.83},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ClarkSSH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CorbettUCD14,
  author       = {Cherita L. Corbett and
                  Jason Uher and
                  Jarriel Cook and
                  Angela Dalton},
  title        = {Countering Intelligent Jamming with Full Protocol Stack Agility},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {2},
  pages        = {44--50},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.136},
  doi          = {10.1109/MSP.2013.136},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CorbettUCD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CranorB14,
  author       = {Lorrie Faith Cranor and
                  Norbou Buchler},
  title        = {Better Together: Usability and Security Go Hand in Hand},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {89--93},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.109},
  doi          = {10.1109/MSP.2014.109},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CranorB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Cristofaro14,
  author       = {Emiliano De Cristofaro},
  title        = {Genomic Privacy and the Rise of a New Research Community},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {2},
  pages        = {80--83},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.24},
  doi          = {10.1109/MSP.2014.24},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Cristofaro14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CybenkoC14,
  author       = {George Cybenko and
                  Kathy Clark{-}Fisher},
  title        = {{IEEE} Security {\&} Privacy: The Early Years},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {18--19},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.48},
  doi          = {10.1109/MSP.2014.48},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CybenkoC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Dark14,
  author       = {Melissa Dark},
  title        = {Advancing Cybersecurity Education},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {79--83},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.108},
  doi          = {10.1109/MSP.2014.108},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Dark14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/DeLong14,
  author       = {John DeLong},
  title        = {Aligning the Compasses: {A} Journey through Compliance and Technology},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {85--89},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.62},
  doi          = {10.1109/MSP.2014.62},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/DeLong14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/DechesneHP14,
  author       = {Francien Dechesne and
                  Dina Hadziosmanovic and
                  Wolter Pieters},
  title        = {Experimenting with Incentives: Security in Pilots for Future Grids},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {59--66},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.115},
  doi          = {10.1109/MSP.2014.115},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/DechesneHP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/EckhoffS14,
  author       = {David Eckhoff and
                  Christoph Sommer},
  title        = {Driving for Big Data? Privacy Concerns in Vehicular Networking},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {1},
  pages        = {77--79},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.2},
  doi          = {10.1109/MSP.2014.2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/EckhoffS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Edelman14,
  author       = {Benjamin Edelman},
  title        = {Accountable? The Problems and Solutions of Online Ad Optimization},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {102--107},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.107},
  doi          = {10.1109/MSP.2014.107},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Edelman14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/EkbergKA14,
  author       = {Jan{-}Erik Ekberg and
                  Kari Kostiainen and
                  N. Asokan},
  title        = {The Untapped Potential of Trusted Execution Environments on Mobile
                  Devices},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {29--37},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.38},
  doi          = {10.1109/MSP.2014.38},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/EkbergKA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Ellis14,
  author       = {Ryan Ellis},
  title        = {Regulating Cybersecurity: Institutional Learning or a Lesson in Futility?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {48--54},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.124},
  doi          = {10.1109/MSP.2014.124},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Ellis14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Epstein14,
  author       = {Jeremy Epstein},
  title        = {Phishing Our Employees},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {3--4},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.51},
  doi          = {10.1109/MSP.2014.51},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Epstein14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Evans14,
  author       = {Katrine Evans},
  title        = {Where in the World Is My Information?: Giving People Access to Their
                  Data},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {5},
  pages        = {78--81},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.104},
  doi          = {10.1109/MSP.2014.104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Evans14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/FinkHMF14,
  author       = {Glenn A. Fink and
                  Jereme N. Haack and
                  A. David McKinnon and
                  Errin W. Fulp},
  title        = {Defense on the Move: Ant-Based Cyber Defense},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {2},
  pages        = {36--43},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.21},
  doi          = {10.1109/MSP.2014.21},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/FinkHMF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/FordC14,
  author       = {Richard Ford and
                  Marco M. Carvalho},
  title        = {Protecting Me},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {1},
  pages        = {80--82},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.10},
  doi          = {10.1109/MSP.2014.10},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/FordC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Garber14,
  author       = {Lee Garber},
  title        = {Security, Privacy, Policy, and Dependability Roundup},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {1},
  pages        = {9--10},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.13},
  doi          = {10.1109/MSP.2014.13},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Garber14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Garber14a,
  author       = {Lee Garber},
  title        = {Security, Privacy, Policy, and Dependability Roundup},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {2},
  pages        = {11--13},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.33},
  doi          = {10.1109/MSP.2014.33},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Garber14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Garber14b,
  author       = {Lee Garber},
  title        = {Security, Privacy, Policy, and Dependability Roundup},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {6--8},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.54},
  doi          = {10.1109/MSP.2014.54},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Garber14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Garber14c,
  author       = {Lee Garber},
  title        = {Security, Privacy, Policy, and Dependability Roundup},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {8--10},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.76},
  doi          = {10.1109/MSP.2014.76},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Garber14c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Garfinkel14,
  author       = {Simson L. Garfinkel},
  title        = {Leaking Sensitive Information in Complex Document Files-and How to
                  Prevent It},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {1},
  pages        = {20--27},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.131},
  doi          = {10.1109/MSP.2013.131},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Garfinkel14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GarfinkelM14,
  author       = {Simson L. Garfinkel and
                  Michael McCarrin},
  title        = {Can We Sniff Wi-Fi?: Implications of Joffe v. Google},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {22--28},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.64},
  doi          = {10.1109/MSP.2014.64},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GarfinkelM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Geer14,
  author       = {Daniel E. Geer Jr.},
  title        = {Polarization},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {1},
  pages        = {88},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.9},
  doi          = {10.1109/MSP.2014.9},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Geer14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Geer14a,
  author       = {Daniel E. Geer Jr.},
  title        = {Personal Data and Government Surveillance},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {90--96},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.73},
  doi          = {10.1109/MSP.2014.73},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Geer14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GeerK14,
  author       = {Daniel E. Geer Jr. and
                  Poul{-}Henning Kamp},
  title        = {Inviting More Heartbleed},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {46--50},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.71},
  doi          = {10.1109/MSP.2014.71},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GeerK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Gellman14,
  author       = {Robert Gellman},
  title        = {Willis Ware's Lasting Contribution to Privacy: Fair Information Practices},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {51--54},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.82},
  doi          = {10.1109/MSP.2014.82},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Gellman14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GervaisKCC14,
  author       = {Arthur Gervais and
                  Ghassan O. Karame and
                  Vedran Capkun and
                  Srdjan Capkun},
  title        = {Is Bitcoin a Decentralized Currency?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {54--60},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.49},
  doi          = {10.1109/MSP.2014.49},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GervaisKCC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GevaHG14,
  author       = {Moti Geva and
                  Amir Herzberg and
                  Yehoshua Gev},
  title        = {Bandwidth Distributed Denial of Service: Attacks and Defenses},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {1},
  pages        = {54--61},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.55},
  doi          = {10.1109/MSP.2013.55},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GevaHG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GiladHS14,
  author       = {Yossi Gilad and
                  Amir Herzberg and
                  Haya Schulmann},
  title        = {Off-Path Hacking: The Illusion of Challenge-Response Authentication},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {5},
  pages        = {68--77},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.130},
  doi          = {10.1109/MSP.2013.130},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GiladHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GoldrichL14,
  author       = {Luanne Goldrich and
                  Carl E. Landwehr},
  title        = {Moving Target [Guest editors' introduction]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {2},
  pages        = {14--15},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.29},
  doi          = {10.1109/MSP.2014.29},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GoldrichL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Grossman14,
  author       = {Wendy M. Grossman},
  title        = {"Emergency" Ushers in a New Era in British Communications Surveillance},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {84--88},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.106},
  doi          = {10.1109/MSP.2014.106},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Grossman14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Herley14,
  author       = {Cormac Herley},
  title        = {More Is Not the Answer},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {1},
  pages        = {14--19},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.134},
  doi          = {10.1109/MSP.2013.134},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Herley14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Horne14,
  author       = {Bill G. Horne},
  title        = {Humans in the Loop},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {1},
  pages        = {3--4},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.5},
  doi          = {10.1109/MSP.2014.5},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Horne14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Horne14a,
  author       = {Bill G. Horne},
  title        = {On Computer Security Incident Response Teams},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {5},
  pages        = {13--15},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.96},
  doi          = {10.1109/MSP.2014.96},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Horne14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/JuelsR14,
  author       = {Ari Juels and
                  Thomas Ristenpart},
  title        = {Honey Encryption: Encryption beyond the Brute-Force Barrier},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {59--62},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.67},
  doi          = {10.1109/MSP.2014.67},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/JuelsR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Kampanakis14,
  author       = {Panos Kampanakis},
  title        = {Security Automation and Threat Information-Sharing Options},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {5},
  pages        = {42--51},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.99},
  doi          = {10.1109/MSP.2014.99},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Kampanakis14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KarglHKVD14,
  author       = {Frank Kargl and
                  Rens W. van der Heijden and
                  Hartmut K{\"{o}}nig and
                  Alfonso Valdes and
                  Marc Dacier},
  title        = {Insights on the Security and Dependability of Industrial Control Systems},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {75--78},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.120},
  doi          = {10.1109/MSP.2014.120},
  timestamp    = {Fri, 24 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KarglHKVD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KerrS14,
  author       = {Michael Kerr and
                  Ron G. van Schyndel},
  title        = {Adapting Law Enforcement Frameworks to Address the Ethical Problems
                  of {CCTV} Product Propagation},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {14--21},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.61},
  doi          = {10.1109/MSP.2014.61},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KerrS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Kshetri14,
  author       = {Nir Kshetri},
  title        = {China's Data Privacy Regulations: {A} Tricky Tradeoff between ICT's
                  Productive Utilization and Cybercontrol},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {38--45},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.105},
  doi          = {10.1109/MSP.2013.105},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Kshetri14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Landau14,
  author       = {Susan Landau},
  title        = {Highlights from Making Sense of Snowden, Part {II:} What's Significant
                  in the {NSA} Revelations},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {1},
  pages        = {62--64},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.161},
  doi          = {10.1109/MSP.2013.161},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Landau14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Landau14a,
  author       = {Susan M. Landau},
  title        = {Educating Engineers: Teaching Privacy in a World of Open Doors},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {66--70},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.43},
  doi          = {10.1109/MSP.2014.43},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Landau14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Landau14b,
  author       = {Susan Landau},
  title        = {Security and Privacy: Facing Ethical Choices},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {3--6},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.75},
  doi          = {10.1109/MSP.2014.75},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Landau14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LarsenBF14,
  author       = {Per Larsen and
                  Stefan Brunthaler and
                  Michael Franz},
  title        = {Security through Diversity: Are We There Yet?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {2},
  pages        = {28--35},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.129},
  doi          = {10.1109/MSP.2013.129},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LarsenBF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LeeDKWW14,
  author       = {Michael Z. Lee and
                  Alan M. Dunn and
                  Jonathan Katz and
                  Brent Waters and
                  Emmett Witchel},
  title        = {Anon-Pass: Practical Anonymous Subscriptions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {20--27},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.158},
  doi          = {10.1109/MSP.2013.158},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LeeDKWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Lesk14,
  author       = {Michael Lesk},
  title        = {Caller {ID:} Whose Privacy?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {2},
  pages        = {77--79},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.20},
  doi          = {10.1109/MSP.2014.20},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Lesk14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Lesk14a,
  author       = {Michael Lesk},
  title        = {Does the Cloud of Surveillance Have a Silver Lining?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {78--81},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.41},
  doi          = {10.1109/MSP.2014.41},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Lesk14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Lesk14b,
  author       = {Michael Lesk},
  title        = {Staffing for Security: Don't Optimize},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {71--73},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.78},
  doi          = {10.1109/MSP.2014.78},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Lesk14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Lesk14c,
  author       = {Michael Lesk},
  title        = {Trust, but Verify},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {94--96},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.130},
  doi          = {10.1109/MSP.2014.130},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Lesk14c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LinLT14,
  author       = {Ying{-}Dar Lin and
                  Chia{-}Yin Lee and
                  Hao{-}Chuan Tsai},
  title        = {Redefining Security Criteria for Networking Devices with Case Studies},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {1},
  pages        = {43--53},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.76},
  doi          = {10.1109/MSP.2013.76},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LinLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MacKie-Mason14,
  author       = {Jeffrey K. MacKie{-}Mason},
  title        = {Can We Afford Privacy from Surveillance?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {5},
  pages        = {86--89},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.88},
  doi          = {10.1109/MSP.2014.88},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MacKie-Mason14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MaimutR14,
  author       = {Diana Maimut and
                  Reza Reyhanitabar},
  title        = {Authenticated Encryption: Toward Next-Generation Algorithms},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {2},
  pages        = {70--72},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.19},
  doi          = {10.1109/MSP.2014.19},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MaimutR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McDanielRS14,
  author       = {Patrick D. McDaniel and
                  Brian Rivera and
                  Ananthram Swami},
  title        = {Toward a Science of Secure Environments},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {68--70},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.81},
  doi          = {10.1109/MSP.2014.81},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McDanielRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McGraw14,
  author       = {Gary McGraw},
  title        = {Silver Bullet Talks with Jon Callas},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {1},
  pages        = {6--8},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.15},
  doi          = {10.1109/MSP.2014.15},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McGraw14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McGraw14a,
  author       = {Gary McGraw},
  title        = {Silver Bullet Talks with Matthew Green},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {2},
  pages        = {7--10},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.34},
  doi          = {10.1109/MSP.2014.34},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McGraw14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McGraw14b,
  author       = {Gary McGraw},
  title        = {Silver Bullet Talks with Yoshi Kohno},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {9--12},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.55},
  doi          = {10.1109/MSP.2014.55},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McGraw14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McGraw14c,
  author       = {Gary McGraw},
  title        = {Silver Bullet Talks with Nate Fick},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {11--13},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.77},
  doi          = {10.1109/MSP.2014.77},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McGraw14c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McGraw14d,
  author       = {Gary McGraw},
  title        = {Silver Bullet Talks with Bart Miller},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {5},
  pages        = {6--8},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.100},
  doi          = {10.1109/MSP.2014.100},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McGraw14d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McGraw14e,
  author       = {Gary McGraw},
  title        = {Silver Bullet Talks with the {IEEE} Center for Secure Design},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {9--12},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.126},
  doi          = {10.1109/MSP.2014.126},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McGraw14e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McParlandPS14,
  author       = {Chuck McParland and
                  Sean Peisert and
                  Anna Scaglione},
  title        = {Monitoring Security of Networked Control Systems: It's the Physics},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {32--39},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.122},
  doi          = {10.1109/MSP.2014.122},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McParlandPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Mulligan14,
  author       = {Deirdre K. Mulligan},
  title        = {The Enduring Importance of Transparency},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {61--65},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.58},
  doi          = {10.1109/MSP.2014.58},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Mulligan14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/NeumannPS14,
  author       = {Peter G. Neumann and
                  Sean Peisert and
                  Marvin Schaefer},
  title        = {The {IEEE} Symposium on Security and Privacy, in Retrospect},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {15--17},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.59},
  doi          = {10.1109/MSP.2014.59},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/NeumannPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/NikiforakisKJKPV14,
  author       = {Nick Nikiforakis and
                  Alexandros Kapravelos and
                  Wouter Joosen and
                  Christopher Kruegel and
                  Frank Piessens and
                  Giovanni Vigna},
  title        = {On the Workings and Current Practices of Web-Based Device Fingerprinting},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {28--36},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.160},
  doi          = {10.1109/MSP.2013.160},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/NikiforakisKJKPV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Ohm14,
  author       = {Paul Ohm},
  title        = {Should Sniffing Wi-Fi Be Illegal?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {1},
  pages        = {73--76},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.14},
  doi          = {10.1109/MSP.2014.14},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Ohm14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/OkhraviHBS14,
  author       = {Hamed Okhravi and
                  Thomas Hobson and
                  David Bigelow and
                  William W. Streilein},
  title        = {Finding Focus in the Blur of Moving-Target Techniques},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {2},
  pages        = {16--26},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.137},
  doi          = {10.1109/MSP.2013.137},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/OkhraviHBS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Ortlieb14,
  author       = {Martin Ortlieb},
  title        = {The Anthropologist's View on Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {85--87},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.57},
  doi          = {10.1109/MSP.2014.57},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Ortlieb14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PalSPB14,
  author       = {Partha P. Pal and
                  Richard E. Schantz and
                  Aaron Paulos and
                  Brett Benyo},
  title        = {Managed Execution Environment as a Moving-Target Defense Infrastructure},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {2},
  pages        = {51--59},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.133},
  doi          = {10.1109/MSP.2013.133},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PalSPB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PeisertM14,
  author       = {Sean Peisert and
                  Jonathan Margulies},
  title        = {Closing the Gap on Securing Energy Sector Control Systems [Guest editors'
                  introduction]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {13--14},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.110},
  doi          = {10.1109/MSP.2014.110},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PeisertM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PeisertMBDPT14,
  author       = {Sean Peisert and
                  Jonathan Margulies and
                  Eric Byres and
                  Paul Dorey and
                  Dale Peterson and
                  Zach Tudor},
  title        = {Control Systems Security from the Front Lines},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {55--58},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.112},
  doi          = {10.1109/MSP.2014.112},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PeisertMBDPT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PeisertMNKS14,
  author       = {Sean Peisert and
                  Jonathan Margulies and
                  David M. Nicol and
                  Himanshu Khurana and
                  Chris Sawall},
  title        = {Designed-in Security for Cyber-Physical Systems},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {5},
  pages        = {9--12},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.90},
  doi          = {10.1109/MSP.2014.90},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PeisertMNKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Pfleeger14,
  author       = {Shari Lawrence Pfleeger},
  title        = {The Eyes Have It: Surveillance and How It Evolved},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {74--79},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.80},
  doi          = {10.1109/MSP.2014.80},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Pfleeger14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Pfleeger14a,
  author       = {Shari Lawrence Pfleeger},
  title        = {Expanding to Meet Readers' Needs},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {5},
  pages        = {3--4},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.91},
  doi          = {10.1109/MSP.2014.91},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Pfleeger14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Pfleeger14b,
  author       = {Shari Lawrence Pfleeger},
  title        = {Technology, Transparency, and Trust},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {3--5},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.128},
  doi          = {10.1109/MSP.2014.128},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Pfleeger14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PhamECKI14,
  author       = {Cuong Manh Pham and
                  Zachary Estrada and
                  Phuong Cao and
                  Zbigniew T. Kalbarczyk and
                  Ravishankar K. Iyer},
  title        = {Building Reliable and Secure Virtual Machines Using Architectural
                  Invariants},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {5},
  pages        = {82--85},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.87},
  doi          = {10.1109/MSP.2014.87},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PhamECKI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ReardonBC14,
  author       = {Joel Reardon and
                  David A. Basin and
                  Srdjan Capkun},
  title        = {On Secure Data Deletion},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {37--44},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.159},
  doi          = {10.1109/MSP.2013.159},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ReardonBC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RuefleDMHMP14,
  author       = {Robin Ruefle and
                  Audrey J. Dorofee and
                  David A. Mundie and
                  Allen D. Householder and
                  Michael Murray and
                  Samuel J. Perl},
  title        = {Computer Security Incident Response Team Development and Evolution},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {5},
  pages        = {16--26},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.89},
  doi          = {10.1109/MSP.2014.89},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RuefleDMHMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RyooRAK14,
  author       = {Jungwoo Ryoo and
                  Syed Rizvi and
                  William Aiken and
                  John Kissell},
  title        = {Cloud Security Auditing: Challenges and Emerging Approaches},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {68--74},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.132},
  doi          = {10.1109/MSP.2013.132},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RyooRAK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Sanders14,
  author       = {William H. Sanders},
  title        = {Quantitative Security Metrics: Unattainable Holy Grail or a Vital
                  Breakthrough within Our Reach?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {2},
  pages        = {67--69},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.31},
  doi          = {10.1109/MSP.2014.31},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Sanders14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SangND14,
  author       = {Fernand Lone Sang and
                  Vincent Nicomette and
                  Yves Deswarte},
  title        = {A Tool to Analyze Potential {I/O} Attacks against PCs},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {2},
  pages        = {60--66},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.79},
  doi          = {10.1109/MSP.2013.79},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SangND14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SasseP14,
  author       = {Martina Angela Sasse and
                  Charles C. Palmer},
  title        = {Protecting You},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {1},
  pages        = {11--13},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.11},
  doi          = {10.1109/MSP.2014.11},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SasseP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SassePJCWC14,
  author       = {Martina Angela Sasse and
                  Charles C. Palmer and
                  Markus Jakobsson and
                  Sunny Consolvo and
                  Rick Wash and
                  L. Jean Camp},
  title        = {Helping You Protect You},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {1},
  pages        = {39--42},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.4},
  doi          = {10.1109/MSP.2014.4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SassePJCWC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier14,
  author       = {Bruce Schneier},
  title        = {Metadata = Surveillance},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {2},
  pages        = {84},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.28},
  doi          = {10.1109/MSP.2014.28},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier14a,
  author       = {Bruce Schneier},
  title        = {The Future of Incident Response},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {5},
  pages        = {96},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.102},
  doi          = {10.1109/MSP.2014.102},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SchwartzMCA14,
  author       = {Moses Schwartz and
                  John Mulder and
                  Adrian R. Chavez and
                  Benjamin A. Allan},
  title        = {Emerging Techniques for Field Device Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {24--31},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.114},
  doi          = {10.1109/MSP.2014.114},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SchwartzMCA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Slomovic14,
  author       = {Anna Slomovic},
  title        = {Privacy Issues in Identity Verification},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {71--73},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.52},
  doi          = {10.1109/MSP.2014.52},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Slomovic14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SundaramurthyMORW14,
  author       = {Sathya Chandran Sundaramurthy and
                  John McHugh and
                  Xinming Simon Ou and
                  S. Raj Rajagopalan and
                  Michael Wesch},
  title        = {An Anthropological Approach to Studying CSIRTs},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {5},
  pages        = {52--60},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.84},
  doi          = {10.1109/MSP.2014.84},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SundaramurthyMORW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SzekeresPWS14,
  author       = {Laszlo Szekeres and
                  Mathias Payer and
                  Tao Wei and
                  R. Sekar},
  title        = {Eternal War in Memory},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {45--53},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.44},
  doi          = {10.1109/MSP.2014.44},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SzekeresPWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ZonouzRM14,
  author       = {Saman A. Zonouz and
                  Julian L. Rrushi and
                  Stephen E. McLaughlin},
  title        = {Detecting Industrial Control Malware Using Automated {PLC} Code Analytics},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {40--47},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.113},
  doi          = {10.1109/MSP.2014.113},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ZonouzRM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics