Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ieeesp/ieeesp12.bht:"
@article{DBLP:journals/ieeesp/BalebakoC14, author = {Rebecca Balebako and Lorrie Faith Cranor}, title = {Improving App Privacy: Nudging App Developers to Protect User Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {55--58}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.70}, doi = {10.1109/MSP.2014.70}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BalebakoC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BarretoGCMQ14, author = {Carlos A. Barreto and Jairo Alonso Giraldo and Alvaro A. C{\'{a}}rdenas and Eduardo Mojica{-}Nava and Nicanor Quijano}, title = {Control Systems for the Power Grid and Their Resiliency to Attacks}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {15--23}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.111}, doi = {10.1109/MSP.2014.111}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BarretoGCMQ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BauerH14, author = {Todd Bauer and Jason R. Hamlet}, title = {Physical Unclonable Functions: {A} Primer}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {97--101}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.123}, doi = {10.1109/MSP.2014.123}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BauerH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin14, author = {Steven M. Bellovin}, title = {Dr. Strangecode}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {88}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.42}, doi = {10.1109/MSP.2014.42}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin14a, author = {Steven M. Bellovin}, title = {By Any Means Possible: How Intelligence Agencies Have Gotten Their Data}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {80--84}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.63}, doi = {10.1109/MSP.2014.63}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin14b, author = {Steven M. Bellovin}, title = {What Should Crypto Look Like?}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {108}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.131}, doi = {10.1109/MSP.2014.131}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Benzel14, author = {Terry Benzel}, title = {A Symposium, a Magazine, and a Community}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {13--14}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.39}, doi = {10.1109/MSP.2014.39}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Benzel14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BeuhringS14, author = {Aaron Beuhring and Kyle Salous}, title = {Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {5}, pages = {90--93}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.86}, doi = {10.1109/MSP.2014.86}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BeuhringS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BhattMZ14, author = {Sandeep N. Bhatt and Pratyusa K. Manadhata and Loai Zomlot}, title = {The Operational Role of Security Information and Event Management Systems}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {5}, pages = {35--41}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.103}, doi = {10.1109/MSP.2014.103}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BhattMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BhattacharyaYGQY14, author = {Prabir Bhattacharya and Li Yang and Minzhe Guo and Kai Qian and Ming Yang}, title = {Learning Mobile Security with Labware}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {69--72}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.6}, doi = {10.1109/MSP.2014.6}, timestamp = {Fri, 06 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BhattacharyaYGQY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BonebrakeO14, author = {Christopher A. Bonebrake and Lori Ross O'Neil}, title = {Attacks on {GPS} Time Reliability}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {82--84}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.40}, doi = {10.1109/MSP.2014.40}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BonebrakeO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BratusDLPSS14, author = {Sergey Bratus and Trey Darley and Michael E. Locasto and Meredith L. Patterson and Rebecca Shapiro and Anna Shubina}, title = {Beyond Planted Bugs in "Trusting Trust": The Input-Processing Frontier}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {83--87}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.1}, doi = {10.1109/MSP.2014.1}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BratusDLPSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BrozM14, author = {Milan Broz and Vashek Matyas}, title = {The TrueCrypt On-Disk Format-An Independent View}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {74--77}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.60}, doi = {10.1109/MSP.2014.60}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BrozM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Candea14, author = {George Candea}, title = {The Tests-versus-Proofs Conundrum}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {65--68}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.18}, doi = {10.1109/MSP.2014.18}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Candea14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CaputoPFJ14, author = {Deanna D. Caputo and Shari Lawrence Pfleeger and Jesse D. Freeman and M. Eric Johnson}, title = {Going Spear Phishing: Exploring Embedded Training and Awareness}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {28--38}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.106}, doi = {10.1109/MSP.2013.106}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/CaputoPFJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CarvalhoDFW14, author = {Marco M. Carvalho and Jared DeMott and Richard Ford and David A. Wheeler}, title = {Heartbleed 101}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {63--67}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.66}, doi = {10.1109/MSP.2014.66}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/CarvalhoDFW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CarvalhoF14, author = {Marco M. Carvalho and Richard Ford}, title = {Moving-Target Defenses for Computer Networks}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {2}, pages = {73--76}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.30}, doi = {10.1109/MSP.2014.30}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/CarvalhoF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ChenSZDTG14, author = {Tiffani R. Chen and Daniel B. Shore and Stephen J. Zaccaro and Reeshad S. Dalal and Lois E. Tetrick and Aiva K. Gorab}, title = {An Organizational Psychology Perspective to Examining Computer Security Incident Response Teams}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {5}, pages = {61--67}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.85}, doi = {10.1109/MSP.2014.85}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/ChenSZDTG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ClarkSSH14, author = {Kas Clark and Don Stikvoort and Eelco Stofbergen and Elly van den Heuvel}, title = {A Dutch Approach to Cybersecurity through Participation}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {5}, pages = {27--34}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.83}, doi = {10.1109/MSP.2014.83}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ClarkSSH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CorbettUCD14, author = {Cherita L. Corbett and Jason Uher and Jarriel Cook and Angela Dalton}, title = {Countering Intelligent Jamming with Full Protocol Stack Agility}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {2}, pages = {44--50}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.136}, doi = {10.1109/MSP.2013.136}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/CorbettUCD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CranorB14, author = {Lorrie Faith Cranor and Norbou Buchler}, title = {Better Together: Usability and Security Go Hand in Hand}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {89--93}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.109}, doi = {10.1109/MSP.2014.109}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/CranorB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Cristofaro14, author = {Emiliano De Cristofaro}, title = {Genomic Privacy and the Rise of a New Research Community}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {2}, pages = {80--83}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.24}, doi = {10.1109/MSP.2014.24}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Cristofaro14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CybenkoC14, author = {George Cybenko and Kathy Clark{-}Fisher}, title = {{IEEE} Security {\&} Privacy: The Early Years}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {18--19}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.48}, doi = {10.1109/MSP.2014.48}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/CybenkoC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Dark14, author = {Melissa Dark}, title = {Advancing Cybersecurity Education}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {79--83}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.108}, doi = {10.1109/MSP.2014.108}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Dark14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/DeLong14, author = {John DeLong}, title = {Aligning the Compasses: {A} Journey through Compliance and Technology}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {85--89}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.62}, doi = {10.1109/MSP.2014.62}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/DeLong14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/DechesneHP14, author = {Francien Dechesne and Dina Hadziosmanovic and Wolter Pieters}, title = {Experimenting with Incentives: Security in Pilots for Future Grids}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {59--66}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.115}, doi = {10.1109/MSP.2014.115}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/DechesneHP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/EckhoffS14, author = {David Eckhoff and Christoph Sommer}, title = {Driving for Big Data? Privacy Concerns in Vehicular Networking}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {77--79}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.2}, doi = {10.1109/MSP.2014.2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/EckhoffS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Edelman14, author = {Benjamin Edelman}, title = {Accountable? The Problems and Solutions of Online Ad Optimization}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {102--107}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.107}, doi = {10.1109/MSP.2014.107}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Edelman14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/EkbergKA14, author = {Jan{-}Erik Ekberg and Kari Kostiainen and N. Asokan}, title = {The Untapped Potential of Trusted Execution Environments on Mobile Devices}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {29--37}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.38}, doi = {10.1109/MSP.2014.38}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/EkbergKA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Ellis14, author = {Ryan Ellis}, title = {Regulating Cybersecurity: Institutional Learning or a Lesson in Futility?}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {48--54}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.124}, doi = {10.1109/MSP.2014.124}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Ellis14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Epstein14, author = {Jeremy Epstein}, title = {Phishing Our Employees}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {3--4}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.51}, doi = {10.1109/MSP.2014.51}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Epstein14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Evans14, author = {Katrine Evans}, title = {Where in the World Is My Information?: Giving People Access to Their Data}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {5}, pages = {78--81}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.104}, doi = {10.1109/MSP.2014.104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Evans14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/FinkHMF14, author = {Glenn A. Fink and Jereme N. Haack and A. David McKinnon and Errin W. Fulp}, title = {Defense on the Move: Ant-Based Cyber Defense}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {2}, pages = {36--43}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.21}, doi = {10.1109/MSP.2014.21}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/FinkHMF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/FordC14, author = {Richard Ford and Marco M. Carvalho}, title = {Protecting Me}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {80--82}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.10}, doi = {10.1109/MSP.2014.10}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/FordC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Garber14, author = {Lee Garber}, title = {Security, Privacy, Policy, and Dependability Roundup}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {9--10}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.13}, doi = {10.1109/MSP.2014.13}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Garber14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Garber14a, author = {Lee Garber}, title = {Security, Privacy, Policy, and Dependability Roundup}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {2}, pages = {11--13}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.33}, doi = {10.1109/MSP.2014.33}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Garber14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Garber14b, author = {Lee Garber}, title = {Security, Privacy, Policy, and Dependability Roundup}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {6--8}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.54}, doi = {10.1109/MSP.2014.54}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Garber14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Garber14c, author = {Lee Garber}, title = {Security, Privacy, Policy, and Dependability Roundup}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {8--10}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.76}, doi = {10.1109/MSP.2014.76}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Garber14c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Garfinkel14, author = {Simson L. Garfinkel}, title = {Leaking Sensitive Information in Complex Document Files-and How to Prevent It}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {20--27}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.131}, doi = {10.1109/MSP.2013.131}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Garfinkel14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GarfinkelM14, author = {Simson L. Garfinkel and Michael McCarrin}, title = {Can We Sniff Wi-Fi?: Implications of Joffe v. Google}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {22--28}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.64}, doi = {10.1109/MSP.2014.64}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GarfinkelM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer14, author = {Daniel E. Geer Jr.}, title = {Polarization}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {88}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.9}, doi = {10.1109/MSP.2014.9}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer14a, author = {Daniel E. Geer Jr.}, title = {Personal Data and Government Surveillance}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {90--96}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.73}, doi = {10.1109/MSP.2014.73}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerK14, author = {Daniel E. Geer Jr. and Poul{-}Henning Kamp}, title = {Inviting More Heartbleed}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {46--50}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.71}, doi = {10.1109/MSP.2014.71}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Gellman14, author = {Robert Gellman}, title = {Willis Ware's Lasting Contribution to Privacy: Fair Information Practices}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {51--54}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.82}, doi = {10.1109/MSP.2014.82}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Gellman14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GervaisKCC14, author = {Arthur Gervais and Ghassan O. Karame and Vedran Capkun and Srdjan Capkun}, title = {Is Bitcoin a Decentralized Currency?}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {54--60}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.49}, doi = {10.1109/MSP.2014.49}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/GervaisKCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GevaHG14, author = {Moti Geva and Amir Herzberg and Yehoshua Gev}, title = {Bandwidth Distributed Denial of Service: Attacks and Defenses}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {54--61}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.55}, doi = {10.1109/MSP.2013.55}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GevaHG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GiladHS14, author = {Yossi Gilad and Amir Herzberg and Haya Schulmann}, title = {Off-Path Hacking: The Illusion of Challenge-Response Authentication}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {5}, pages = {68--77}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.130}, doi = {10.1109/MSP.2013.130}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/GiladHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GoldrichL14, author = {Luanne Goldrich and Carl E. Landwehr}, title = {Moving Target [Guest editors' introduction]}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {2}, pages = {14--15}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.29}, doi = {10.1109/MSP.2014.29}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GoldrichL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Grossman14, author = {Wendy M. Grossman}, title = {"Emergency" Ushers in a New Era in British Communications Surveillance}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {84--88}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.106}, doi = {10.1109/MSP.2014.106}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Grossman14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Herley14, author = {Cormac Herley}, title = {More Is Not the Answer}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {14--19}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.134}, doi = {10.1109/MSP.2013.134}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Herley14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Horne14, author = {Bill G. Horne}, title = {Humans in the Loop}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {3--4}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.5}, doi = {10.1109/MSP.2014.5}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Horne14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Horne14a, author = {Bill G. Horne}, title = {On Computer Security Incident Response Teams}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {5}, pages = {13--15}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.96}, doi = {10.1109/MSP.2014.96}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Horne14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/JuelsR14, author = {Ari Juels and Thomas Ristenpart}, title = {Honey Encryption: Encryption beyond the Brute-Force Barrier}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {59--62}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.67}, doi = {10.1109/MSP.2014.67}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/JuelsR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Kampanakis14, author = {Panos Kampanakis}, title = {Security Automation and Threat Information-Sharing Options}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {5}, pages = {42--51}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.99}, doi = {10.1109/MSP.2014.99}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Kampanakis14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KarglHKVD14, author = {Frank Kargl and Rens W. van der Heijden and Hartmut K{\"{o}}nig and Alfonso Valdes and Marc Dacier}, title = {Insights on the Security and Dependability of Industrial Control Systems}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {75--78}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.120}, doi = {10.1109/MSP.2014.120}, timestamp = {Fri, 24 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/KarglHKVD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KerrS14, author = {Michael Kerr and Ron G. van Schyndel}, title = {Adapting Law Enforcement Frameworks to Address the Ethical Problems of {CCTV} Product Propagation}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {14--21}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.61}, doi = {10.1109/MSP.2014.61}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/KerrS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Kshetri14, author = {Nir Kshetri}, title = {China's Data Privacy Regulations: {A} Tricky Tradeoff between ICT's Productive Utilization and Cybercontrol}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {38--45}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.105}, doi = {10.1109/MSP.2013.105}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Kshetri14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Landau14, author = {Susan Landau}, title = {Highlights from Making Sense of Snowden, Part {II:} What's Significant in the {NSA} Revelations}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {62--64}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.161}, doi = {10.1109/MSP.2013.161}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Landau14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Landau14a, author = {Susan M. Landau}, title = {Educating Engineers: Teaching Privacy in a World of Open Doors}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {66--70}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.43}, doi = {10.1109/MSP.2014.43}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Landau14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Landau14b, author = {Susan Landau}, title = {Security and Privacy: Facing Ethical Choices}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {3--6}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.75}, doi = {10.1109/MSP.2014.75}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Landau14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LarsenBF14, author = {Per Larsen and Stefan Brunthaler and Michael Franz}, title = {Security through Diversity: Are We There Yet?}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {2}, pages = {28--35}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.129}, doi = {10.1109/MSP.2013.129}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/LarsenBF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LeeDKWW14, author = {Michael Z. Lee and Alan M. Dunn and Jonathan Katz and Brent Waters and Emmett Witchel}, title = {Anon-Pass: Practical Anonymous Subscriptions}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {20--27}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.158}, doi = {10.1109/MSP.2013.158}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/LeeDKWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Lesk14, author = {Michael Lesk}, title = {Caller {ID:} Whose Privacy?}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {2}, pages = {77--79}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.20}, doi = {10.1109/MSP.2014.20}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Lesk14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Lesk14a, author = {Michael Lesk}, title = {Does the Cloud of Surveillance Have a Silver Lining?}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {78--81}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.41}, doi = {10.1109/MSP.2014.41}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Lesk14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Lesk14b, author = {Michael Lesk}, title = {Staffing for Security: Don't Optimize}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {71--73}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.78}, doi = {10.1109/MSP.2014.78}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Lesk14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Lesk14c, author = {Michael Lesk}, title = {Trust, but Verify}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {94--96}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.130}, doi = {10.1109/MSP.2014.130}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Lesk14c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LinLT14, author = {Ying{-}Dar Lin and Chia{-}Yin Lee and Hao{-}Chuan Tsai}, title = {Redefining Security Criteria for Networking Devices with Case Studies}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {43--53}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.76}, doi = {10.1109/MSP.2013.76}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/LinLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MacKie-Mason14, author = {Jeffrey K. MacKie{-}Mason}, title = {Can We Afford Privacy from Surveillance?}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {5}, pages = {86--89}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.88}, doi = {10.1109/MSP.2014.88}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/MacKie-Mason14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MaimutR14, author = {Diana Maimut and Reza Reyhanitabar}, title = {Authenticated Encryption: Toward Next-Generation Algorithms}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {2}, pages = {70--72}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.19}, doi = {10.1109/MSP.2014.19}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MaimutR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McDanielRS14, author = {Patrick D. McDaniel and Brian Rivera and Ananthram Swami}, title = {Toward a Science of Secure Environments}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {68--70}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.81}, doi = {10.1109/MSP.2014.81}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/McDanielRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McGraw14, author = {Gary McGraw}, title = {Silver Bullet Talks with Jon Callas}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {6--8}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.15}, doi = {10.1109/MSP.2014.15}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/McGraw14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McGraw14a, author = {Gary McGraw}, title = {Silver Bullet Talks with Matthew Green}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {2}, pages = {7--10}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.34}, doi = {10.1109/MSP.2014.34}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/McGraw14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McGraw14b, author = {Gary McGraw}, title = {Silver Bullet Talks with Yoshi Kohno}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {9--12}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.55}, doi = {10.1109/MSP.2014.55}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/McGraw14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McGraw14c, author = {Gary McGraw}, title = {Silver Bullet Talks with Nate Fick}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {11--13}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.77}, doi = {10.1109/MSP.2014.77}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/McGraw14c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McGraw14d, author = {Gary McGraw}, title = {Silver Bullet Talks with Bart Miller}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {5}, pages = {6--8}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.100}, doi = {10.1109/MSP.2014.100}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/McGraw14d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McGraw14e, author = {Gary McGraw}, title = {Silver Bullet Talks with the {IEEE} Center for Secure Design}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {9--12}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.126}, doi = {10.1109/MSP.2014.126}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/McGraw14e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McParlandPS14, author = {Chuck McParland and Sean Peisert and Anna Scaglione}, title = {Monitoring Security of Networked Control Systems: It's the Physics}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {32--39}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.122}, doi = {10.1109/MSP.2014.122}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/McParlandPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Mulligan14, author = {Deirdre K. Mulligan}, title = {The Enduring Importance of Transparency}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {61--65}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.58}, doi = {10.1109/MSP.2014.58}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Mulligan14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/NeumannPS14, author = {Peter G. Neumann and Sean Peisert and Marvin Schaefer}, title = {The {IEEE} Symposium on Security and Privacy, in Retrospect}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {15--17}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.59}, doi = {10.1109/MSP.2014.59}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/NeumannPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/NikiforakisKJKPV14, author = {Nick Nikiforakis and Alexandros Kapravelos and Wouter Joosen and Christopher Kruegel and Frank Piessens and Giovanni Vigna}, title = {On the Workings and Current Practices of Web-Based Device Fingerprinting}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {28--36}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.160}, doi = {10.1109/MSP.2013.160}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/NikiforakisKJKPV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Ohm14, author = {Paul Ohm}, title = {Should Sniffing Wi-Fi Be Illegal?}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {73--76}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.14}, doi = {10.1109/MSP.2014.14}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Ohm14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/OkhraviHBS14, author = {Hamed Okhravi and Thomas Hobson and David Bigelow and William W. Streilein}, title = {Finding Focus in the Blur of Moving-Target Techniques}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {2}, pages = {16--26}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.137}, doi = {10.1109/MSP.2013.137}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/OkhraviHBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Ortlieb14, author = {Martin Ortlieb}, title = {The Anthropologist's View on Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {85--87}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.57}, doi = {10.1109/MSP.2014.57}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Ortlieb14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PalSPB14, author = {Partha P. Pal and Richard E. Schantz and Aaron Paulos and Brett Benyo}, title = {Managed Execution Environment as a Moving-Target Defense Infrastructure}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {2}, pages = {51--59}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.133}, doi = {10.1109/MSP.2013.133}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/PalSPB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PeisertM14, author = {Sean Peisert and Jonathan Margulies}, title = {Closing the Gap on Securing Energy Sector Control Systems [Guest editors' introduction]}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {13--14}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.110}, doi = {10.1109/MSP.2014.110}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/PeisertM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PeisertMBDPT14, author = {Sean Peisert and Jonathan Margulies and Eric Byres and Paul Dorey and Dale Peterson and Zach Tudor}, title = {Control Systems Security from the Front Lines}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {55--58}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.112}, doi = {10.1109/MSP.2014.112}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/PeisertMBDPT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PeisertMNKS14, author = {Sean Peisert and Jonathan Margulies and David M. Nicol and Himanshu Khurana and Chris Sawall}, title = {Designed-in Security for Cyber-Physical Systems}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {5}, pages = {9--12}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.90}, doi = {10.1109/MSP.2014.90}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/PeisertMNKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Pfleeger14, author = {Shari Lawrence Pfleeger}, title = {The Eyes Have It: Surveillance and How It Evolved}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {74--79}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.80}, doi = {10.1109/MSP.2014.80}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Pfleeger14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Pfleeger14a, author = {Shari Lawrence Pfleeger}, title = {Expanding to Meet Readers' Needs}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {5}, pages = {3--4}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.91}, doi = {10.1109/MSP.2014.91}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Pfleeger14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Pfleeger14b, author = {Shari Lawrence Pfleeger}, title = {Technology, Transparency, and Trust}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {3--5}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.128}, doi = {10.1109/MSP.2014.128}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Pfleeger14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PhamECKI14, author = {Cuong Manh Pham and Zachary Estrada and Phuong Cao and Zbigniew T. Kalbarczyk and Ravishankar K. Iyer}, title = {Building Reliable and Secure Virtual Machines Using Architectural Invariants}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {5}, pages = {82--85}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.87}, doi = {10.1109/MSP.2014.87}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/PhamECKI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ReardonBC14, author = {Joel Reardon and David A. Basin and Srdjan Capkun}, title = {On Secure Data Deletion}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {37--44}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.159}, doi = {10.1109/MSP.2013.159}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/ReardonBC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RuefleDMHMP14, author = {Robin Ruefle and Audrey J. Dorofee and David A. Mundie and Allen D. Householder and Michael Murray and Samuel J. Perl}, title = {Computer Security Incident Response Team Development and Evolution}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {5}, pages = {16--26}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.89}, doi = {10.1109/MSP.2014.89}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/RuefleDMHMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RyooRAK14, author = {Jungwoo Ryoo and Syed Rizvi and William Aiken and John Kissell}, title = {Cloud Security Auditing: Challenges and Emerging Approaches}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {68--74}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.132}, doi = {10.1109/MSP.2013.132}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/RyooRAK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Sanders14, author = {William H. Sanders}, title = {Quantitative Security Metrics: Unattainable Holy Grail or a Vital Breakthrough within Our Reach?}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {2}, pages = {67--69}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.31}, doi = {10.1109/MSP.2014.31}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Sanders14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SangND14, author = {Fernand Lone Sang and Vincent Nicomette and Yves Deswarte}, title = {A Tool to Analyze Potential {I/O} Attacks against PCs}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {2}, pages = {60--66}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.79}, doi = {10.1109/MSP.2013.79}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/SangND14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SasseP14, author = {Martina Angela Sasse and Charles C. Palmer}, title = {Protecting You}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {11--13}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.11}, doi = {10.1109/MSP.2014.11}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/SasseP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SassePJCWC14, author = {Martina Angela Sasse and Charles C. Palmer and Markus Jakobsson and Sunny Consolvo and Rick Wash and L. Jean Camp}, title = {Helping You Protect You}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {39--42}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.4}, doi = {10.1109/MSP.2014.4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/SassePJCWC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Schneier14, author = {Bruce Schneier}, title = {Metadata = Surveillance}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {2}, pages = {84}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.28}, doi = {10.1109/MSP.2014.28}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Schneier14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Schneier14a, author = {Bruce Schneier}, title = {The Future of Incident Response}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {5}, pages = {96}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.102}, doi = {10.1109/MSP.2014.102}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Schneier14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SchwartzMCA14, author = {Moses Schwartz and John Mulder and Adrian R. Chavez and Benjamin A. Allan}, title = {Emerging Techniques for Field Device Security}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {24--31}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.114}, doi = {10.1109/MSP.2014.114}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/SchwartzMCA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Slomovic14, author = {Anna Slomovic}, title = {Privacy Issues in Identity Verification}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {71--73}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.52}, doi = {10.1109/MSP.2014.52}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Slomovic14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SundaramurthyMORW14, author = {Sathya Chandran Sundaramurthy and John McHugh and Xinming Simon Ou and S. Raj Rajagopalan and Michael Wesch}, title = {An Anthropological Approach to Studying CSIRTs}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {5}, pages = {52--60}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.84}, doi = {10.1109/MSP.2014.84}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/SundaramurthyMORW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SzekeresPWS14, author = {Laszlo Szekeres and Mathias Payer and Tao Wei and R. Sekar}, title = {Eternal War in Memory}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {45--53}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.44}, doi = {10.1109/MSP.2014.44}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/SzekeresPWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ZonouzRM14, author = {Saman A. Zonouz and Julian L. Rrushi and Stephen E. McLaughlin}, title = {Detecting Industrial Control Malware Using Automated {PLC} Code Analytics}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {40--47}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.113}, doi = {10.1109/MSP.2014.113}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ZonouzRM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.