Search dblp for Publications

export results for "toc:db/journals/ieeesp/ieeesp21.bht:"

 download as .bib file

@article{DBLP:journals/ieeesp/AdamosFG23,
  author       = {Konstantinos Adamos and
                  Fabio Di Franco and
                  Athanasios Vasileios Grammatopoulos},
  title        = {An Analysis of European Union Cybersecurity Higher Education Programs
                  Through the Crowd-Sourced Database CyberHEAD},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {5},
  pages        = {85--94},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3299348},
  doi          = {10.1109/MSEC.2023.3299348},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AdamosFG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ArpQPWPWCR23,
  author       = {Daniel Arp and
                  Erwin Quiring and
                  Feargus Pendlebury and
                  Alexander Warnecke and
                  Fabio Pierazzi and
                  Christian Wressnegger and
                  Lorenzo Cavallaro and
                  Konrad Rieck},
  title        = {Lessons Learned on Machine Learning for Computer Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {5},
  pages        = {72--77},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3287207},
  doi          = {10.1109/MSEC.2023.3287207},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ArpQPWPWCR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/AyubJQA23,
  author       = {Adeen Ayub and
                  Wooyeon Jo and
                  Syed Ali Qasim and
                  Irfan Ahmed},
  title        = {How Are Industrial Control Systems Insecure by Design? {A} Deeper
                  Insight Into Real-World Programmable Logic Controllers},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {4},
  pages        = {10--19},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3271273},
  doi          = {10.1109/MSEC.2023.3271273},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AyubJQA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BalliuBBEMASSSW23,
  author       = {Musard Balliu and
                  Benoit Baudry and
                  Sofia Bobadilla and
                  Mathias Ekstedt and
                  Martin Monperrus and
                  Javier Ron Arteaga and
                  Aman Sharma and
                  Gabriel Skoglund and
                  C{\'{e}}sar Soto{-}Valero and
                  Martin Wittlinger},
  title        = {Challenges of Producing Software Bill of Materials for Java},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {6},
  pages        = {12--23},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3302956},
  doi          = {10.1109/MSEC.2023.3302956},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BalliuBBEMASSSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin23,
  author       = {Steven M. Bellovin},
  title        = {Is Cybersecurity Liability a Liability?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {4},
  pages        = {99--100},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3273461},
  doi          = {10.1109/MSEC.2023.3273461},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Benzel23,
  author       = {Terry Benzel},
  title        = {Security and Privacy Research Artifacts: Are We Making Progress?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {1},
  pages        = {4--6},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2022.3222887},
  doi          = {10.1109/MSEC.2022.3222887},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Benzel23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BenzelO23,
  author       = {Terry Benzel and
                  Hilarie Orman},
  title        = {{IEEE} Security and Privacy Symposium in the Year 2003},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {2},
  pages        = {43--47},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3237103},
  doi          = {10.1109/MSEC.2023.3237103},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BenzelO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bertino23,
  author       = {Elisa Bertino},
  title        = {Privacy in the Era of 5G, IoT, Big Data, and Machine Learning},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {1},
  pages        = {91--92},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2022.3221171},
  doi          = {10.1109/MSEC.2022.3221171},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bertino23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BlakleyC23,
  author       = {Bob Blakley and
                  Lorrie Cranor},
  title        = {Katie Moussouris: Vulnerability Disclosure and Security Workforce
                  Development},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {1},
  pages        = {11--18},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2022.3222043},
  doi          = {10.1109/MSEC.2022.3222043},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BlakleyC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BlakleyC23a,
  author       = {Bob Blakley and
                  Lorrie Cranor},
  title        = {A 20th Anniversary Episode Chat With S{\&}P Editors George Cybenko,
                  Carl Landwehr, Shari Lawrence Pfleeger, and Sean Peisert},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {2},
  pages        = {9--16},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3239179},
  doi          = {10.1109/MSEC.2023.3239179},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BlakleyC23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BurbanoGLCS23,
  author       = {Luis Burbano and
                  Kunal Garg and
                  Santiago J. Leudo and
                  Alvaro A. C{\'{a}}rdenas and
                  Ricardo G. Sanfelice},
  title        = {Online Attack Recovery in Cyberphysical Systems},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {4},
  pages        = {20--28},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3268573},
  doi          = {10.1109/MSEC.2023.3268573},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BurbanoGLCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CavallaroKPP23,
  author       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Feargus Pendlebury and
                  Fabio Pierazzi},
  title        = {Are Machine Learning Models for Malware Detection Ready for Prime
                  Time?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {2},
  pages        = {53--56},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3236543},
  doi          = {10.1109/MSEC.2023.3236543},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CavallaroKPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CiclosiM23,
  author       = {Francesco Ciclosi and
                  Fabio Massacci},
  title        = {The Data Protection Officer: {A} Ubiquitous Role That No One Really
                  Knows},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {1},
  pages        = {66--77},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2022.3222115},
  doi          = {10.1109/MSEC.2022.3222115},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CiclosiM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CiocarlieZ23,
  author       = {Gabriela F. Ciocarlie and
                  Jianying Zhou},
  title        = {Securing Critical Infrastructure Across Cyber and Physical Dimensions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {4},
  pages        = {9},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3282424},
  doi          = {10.1109/MSEC.2023.3282424},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CiocarlieZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Cowan23,
  author       = {Crispin Cowan},
  title        = {Open and Closed Software Security Redux},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {2},
  pages        = {18--23},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2022.3227819},
  doi          = {10.1109/MSEC.2022.3227819},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Cowan23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/DoumanidisXRPSZM23,
  author       = {Constantine Doumanidis and
                  Yongyu Xie and
                  Prashant Hari Narayan Rajput and
                  Ryan Pickren and
                  Burak Sahin and
                  Saman Zonouz and
                  Michail Maniatakos},
  title        = {Dissecting the Industrial Control Systems Software Supply Chain},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {4},
  pages        = {39--50},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3266775},
  doi          = {10.1109/MSEC.2023.3266775},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/DoumanidisXRPSZM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/EckhartEAACJNRY23,
  author       = {Matthias Eckhart and
                  Andreas Ekelhart and
                  David Allison and
                  Magnus Almgren and
                  Katharina Ceesay{-}Seitz and
                  Helge Janicke and
                  Simin Nadjm{-}Tehrani and
                  Awais Rashid and
                  Mark Yampolskiy},
  title        = {Security-Enhancing Digital Twins: Characteristics, Indicators, and
                  Future Perspectives},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {6},
  pages        = {64--75},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3271225},
  doi          = {10.1109/MSEC.2023.3271225},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/EckhartEAACJNRY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/FazelniaOM23,
  author       = {Mohamad Fazelnia and
                  Ahmet Okutan and
                  Mehdi Mirakhorli},
  title        = {Supporting Artificial Intelligence/Machine Learning Security Workers
                  Through an Adversarial Techniques, Tools, and Common Knowledge Framework},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {1},
  pages        = {37--48},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2022.3221058},
  doi          = {10.1109/MSEC.2022.3221058},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/FazelniaOM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/FourneWFA23,
  author       = {Marcel Fourn{\'{e}} and
                  Dominik Wermke and
                  Sascha Fahl and
                  Yasemin Acar},
  title        = {A Viewpoint on Human Factors in Software Supply Chain Security: {A}
                  Research Agenda},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {6},
  pages        = {59--63},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3316569},
  doi          = {10.1109/MSEC.2023.3316569},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/FourneWFA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Geer23,
  author       = {Daniel E. Geer},
  title        = {Whither Software?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {2},
  pages        = {89--90},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3236541},
  doi          = {10.1109/MSEC.2023.3236541},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Geer23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Geer23a,
  author       = {Daniel E. Geer},
  title        = {Convergence: Ongoing},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {5},
  pages        = {95--96},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3295439},
  doi          = {10.1109/MSEC.2023.3295439},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Geer23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GorskiIS23,
  author       = {Peter Leo Gorski and
                  Luigi Lo Iacono and
                  Matthew Smith},
  title        = {Eight Lightweight Usable Security Principles for Developers},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {1},
  pages        = {20--26},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2022.3205484},
  doi          = {10.1109/MSEC.2022.3205484},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GorskiIS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Gradon23,
  author       = {Kacper T. Gradon},
  title        = {Electric Sheep on the Pastures of Disinformation and Targeted Phishing
                  Campaigns: The Security Implications of ChatGPT},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {3},
  pages        = {58--61},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3255039},
  doi          = {10.1109/MSEC.2023.3255039},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Gradon23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Jaeger23,
  author       = {Trent Jaeger},
  title        = {On Bridges and Software},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {3},
  pages        = {4--5},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3258207},
  doi          = {10.1109/MSEC.2023.3258207},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Jaeger23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/JaegerKMS23,
  author       = {Trent Jaeger and
                  Brent ByungHoon Kang and
                  Nele Mentens and
                  Cynthia Sturton},
  title        = {Impact of Emerging Hardware on Security and Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {3},
  pages        = {6--7},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3258206},
  doi          = {10.1109/MSEC.2023.3258206},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/JaegerKMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KerschbaumL23,
  author       = {Florian Kerschbaum and
                  Nils Lukas},
  title        = {Privacy-Preserving Machine Learning [Cryptography]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {6},
  pages        = {90--94},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3315944},
  doi          = {10.1109/MSEC.2023.3315944},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KerschbaumL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Kohno23,
  author       = {Tadayoshi Kohno},
  title        = {\{In Earth\} Until (Ready)},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {2},
  pages        = {7--8},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3237099},
  doi          = {10.1109/MSEC.2023.3237099},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Kohno23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Kohno23a,
  author       = {Tadayoshi Kohno},
  title        = {In Your Eyes},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {5},
  pages        = {4--5},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3295440},
  doi          = {10.1109/MSEC.2023.3295440},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Kohno23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KrishnanCLBK23,
  author       = {Padmanabhan Krishnan and
                  Cristina Cifuentes and
                  Li Li and
                  Tegawend{\'{e}} F. Bissyand{\'{e}} and
                  Jacques Klein},
  title        = {Why Is Static Application Security Testing Hard to Learn?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {5},
  pages        = {68--72},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3287206},
  doi          = {10.1109/MSEC.2023.3287206},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KrishnanCLBK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LacosteL23,
  author       = {Marc Lacoste and
                  Vincent Lefebvre},
  title        = {Trusted Execution Environments for Telecoms: Strengths, Weaknesses,
                  Opportunities, and Threats},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {3},
  pages        = {37--46},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3259801},
  doi          = {10.1109/MSEC.2023.3259801},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LacosteL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LadisaPSMB23,
  author       = {Piergiorgio Ladisa and
                  Serena Elisa Ponta and
                  Antonino Sabetta and
                  Matias Martinez and
                  Olivier Barais},
  title        = {Journey to the Center of Software Supply Chain Attacks},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {6},
  pages        = {34--49},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3302066},
  doi          = {10.1109/MSEC.2023.3302066},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LadisaPSMB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LandwehrRWTJKK23,
  author       = {Carl E. Landwehr and
                  Michael K. Reiter and
                  Laurie A. Williams and
                  Gene Tsudik and
                  Trent Jaeger and
                  Tadayoshi Kohno and
                  Apu Kapadia},
  title        = {Looking Backwards (and Forwards): {NSF} Secure and Trustworthy Computing
                  20-Year Retrospective Panel Transcription},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {2},
  pages        = {32--42},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2022.3208721},
  doi          = {10.1109/MSEC.2022.3208721},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LandwehrRWTJKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LipnerH23,
  author       = {Steve Lipner and
                  Michael Howard},
  title        = {Inside the Windows Security Push: {A} Twenty-Year Retrospective},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {2},
  pages        = {24--31},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2022.3228098},
  doi          = {10.1109/MSEC.2022.3228098},
  timestamp    = {Wed, 24 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LipnerH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MajeedH23,
  author       = {Abdul Majeed and
                  Seong Oun Hwang},
  title        = {Rectification of Syntactic and Semantic Privacy Mechanisms},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {5},
  pages        = {18--32},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2022.3188365},
  doi          = {10.1109/MSEC.2022.3188365},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MajeedH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Malkin23,
  author       = {Nathan Malkin},
  title        = {Contextual Integrity, Explained: {A} More Usable Privacy Definition},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {1},
  pages        = {58--65},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2022.3201585},
  doi          = {10.1109/MSEC.2022.3201585},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Malkin23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MassacciW23,
  author       = {Fabio Massacci and
                  Laurie A. Williams},
  title        = {Software Supply Chain Security [Guest Editors' Introduction]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {6},
  pages        = {8--10},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3321189},
  doi          = {10.1109/MSEC.2023.3321189},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MassacciW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Mathur23,
  author       = {Aditya P. Mathur},
  title        = {Reconfigurable Digital Twin to Support Research, Education, and Training
                  in the Defense of Critical Infrastructure},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {4},
  pages        = {51--60},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3281272},
  doi          = {10.1109/MSEC.2023.3281272},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Mathur23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MelaraT23,
  author       = {Marcela S. Melara and
                  Santiago Torres{-}Arias},
  title        = {A Viewpoint on Software Supply Chain Security: Are We Getting Lost
                  in Translation?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {6},
  pages        = {55--58},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3316568},
  doi          = {10.1109/MSEC.2023.3316568},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MelaraT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MezaRORK23,
  author       = {Andres Meza and
                  Francesco Restuccia and
                  Jason Oberg and
                  Dominic Rizzo and
                  Ryan Kastner},
  title        = {Security Verification of the OpenTitan Hardware Root of Trust},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {3},
  pages        = {27--36},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3251954},
  doi          = {10.1109/MSEC.2023.3251954},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MezaRORK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MilankovichT23,
  author       = {{\'{A}}kos Mil{\'{a}}nkovich and
                  Katja Tuma},
  title        = {Delta Security Certification for Software Supply Chains},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {6},
  pages        = {24--33},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3311464},
  doi          = {10.1109/MSEC.2023.3311464},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MilankovichT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/NanayakkaraH23,
  author       = {Priyanka Nanayakkara and
                  Jessica Hullman},
  title        = {What's Driving Conflicts Around Differential Privacy for the {U.S.}
                  Census},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {5},
  pages        = {33--42},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2022.3202793},
  doi          = {10.1109/MSEC.2022.3202793},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/NanayakkaraH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/NarayananB23,
  author       = {Vikram Narayanan and
                  Anton Burtsev},
  title        = {The Opportunities and Limitations of Extended Page Table Switching
                  for Fine-Grained Isolation},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {3},
  pages        = {16--26},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3251385},
  doi          = {10.1109/MSEC.2023.3251385},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/NarayananB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/NarayananL23,
  author       = {Arvind Narayanan and
                  Kevin Lee},
  title        = {Security Policy Audits: Why and How},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {2},
  pages        = {77--81},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3236540},
  doi          = {10.1109/MSEC.2023.3236540},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/NarayananL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/NicolSABCL23,
  author       = {David M. Nicol and
                  Gregory Shannon and
                  Monika Akbar and
                  Matt Bishop and
                  Michael M. Chaney and
                  Matthew E. Luallen},
  title        = {Toward Common Weakness Enumerations in Industrial Control Systems},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {4},
  pages        = {84--93},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3279515},
  doi          = {10.1109/MSEC.2023.3279515},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/NicolSABCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ObermeierJRUH23,
  author       = {Sebastian Obermeier and
                  Thomas J{\"{o}}sler and
                  Stephan Renggli and
                  Maurus Untern{\"{a}}hrer and
                  Bernhard M. H{\"{a}}mmerli},
  title        = {Automating Recovery in Mixed Operation Technology/IT Critical Infrastructures},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {5},
  pages        = {43--54},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3264595},
  doi          = {10.1109/MSEC.2023.3264595},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ObermeierJRUH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Oorschot23,
  author       = {Paul C. van Oorschot},
  title        = {Memory Errors and Memory Safety: {C} as a Case Study},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {2},
  pages        = {70--76},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3236542},
  doi          = {10.1109/MSEC.2023.3236542},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Oorschot23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Oorschot23a,
  author       = {Paul C. van Oorschot},
  title        = {Memory Errors and Memory Safety: {A} Look at Java and Rust},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {3},
  pages        = {62--68},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3249719},
  doi          = {10.1109/MSEC.2023.3249719},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Oorschot23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ParkLK23,
  author       = {Soyeon Park and
                  Sangho Lee and
                  Taesoo Kim},
  title        = {Memory Protection Keys: Facts, Key Extension Perspectives, and Discussions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {3},
  pages        = {8--15},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3250601},
  doi          = {10.1109/MSEC.2023.3250601},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ParkLK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ParkS23,
  author       = {Sungmi Park and
                  Douglas Stebila},
  title        = {The Future of Digital Investigation: Automated Legal Inference},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {1},
  pages        = {84--90},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2022.3223187},
  doi          = {10.1109/MSEC.2022.3223187},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ParkS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Peisert23,
  author       = {Sean Peisert},
  title        = {The First 20 Years of {IEEE} Security {\&} Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {2},
  pages        = {4--6},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3236420},
  doi          = {10.1109/MSEC.2023.3236420},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Peisert23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Peisert23a,
  author       = {Sean Peisert},
  title        = {On Software Infrastructure: Develop, Prove, Profit?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {4},
  pages        = {4--8},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3273492},
  doi          = {10.1109/MSEC.2023.3273492},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Peisert23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Piessens23,
  author       = {Frank Piessens},
  title        = {Transient Execution Attacks},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {5},
  pages        = {79--84},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3299349},
  doi          = {10.1109/MSEC.2023.3299349},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Piessens23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RedmilesBK23,
  author       = {Elissa M. Redmiles and
                  Mia M. Bennett and
                  Tadayoshi Kohno},
  title        = {Power in Computer Security and Privacy: {A} Critical Lens},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {2},
  pages        = {48--52},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3238591},
  doi          = {10.1109/MSEC.2023.3238591},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RedmilesBK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RomanALS23,
  author       = {Rodrigo Roman and
                  Cristina Alcaraz and
                  Javier L{\'{o}}pez and
                  Kouichi Sakurai},
  title        = {Current Perspectives on Securing Critical Infrastructures' Supply
                  Chains},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {4},
  pages        = {29--38},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3247946},
  doi          = {10.1109/MSEC.2023.3247946},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RomanALS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RuzomberkaLBGWP23,
  author       = {Eric Ruzomberka and
                  David J. Love and
                  Christopher G. Brinton and
                  Arpit Gupta and
                  Chih{-}Chun Wang and
                  H. Vincent Poor},
  title        = {Challenges and Opportunities for Beyond-5G Wireless Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {5},
  pages        = {55--66},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3251888},
  doi          = {10.1109/MSEC.2023.3251888},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RuzomberkaLBGWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SarieddineSJADA23,
  author       = {Khaled Sarieddine and
                  Mohammad Ali Sayed and
                  Danial Jafarigiv and
                  Ribal Atallah and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {A Real-Time Cosimulation Testbed for Electric Vehicle Charging and
                  Smart Grid Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {4},
  pages        = {74--83},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3247374},
  doi          = {10.1109/MSEC.2023.3247374},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SarieddineSJADA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier23,
  author       = {Bruce Schneier},
  title        = {Trustworthy {AI} Means Public {AI} [Last Word]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {6},
  pages        = {95--96},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3301262},
  doi          = {10.1109/MSEC.2023.3301262},
  timestamp    = {Fri, 24 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Shostack23,
  author       = {Adam Shostack},
  title        = {Nothing Is Good Enough: Fast and Cheap Are Undervalued as Influencers
                  of Security Tool Adoption},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {1},
  pages        = {78--83},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2022.3223551},
  doi          = {10.1109/MSEC.2022.3223551},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Shostack23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Smart23,
  author       = {Nigel P. Smart},
  title        = {Computing on Encrypted Data},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {4},
  pages        = {94--98},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3279517},
  doi          = {10.1109/MSEC.2023.3279517},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Smart23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/StrohmeierLMRSL23,
  author       = {Martin Strohmeier and
                  Mauro Leonardi and
                  Sergei Markochev and
                  Fabio Ricciato and
                  Matthias Sch{\"{a}}fer and
                  Vincent Lenders},
  title        = {In Pursuit of Aviation Cybersecurity: Experiences and Lessons From
                  a Competitive Approach},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {4},
  pages        = {61--73},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3265523},
  doi          = {10.1109/MSEC.2023.3265523},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/StrohmeierLMRSL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/TahaeiVR23,
  author       = {Mohammad Tahaei and
                  Kami Vaniea and
                  Awais Rashid},
  title        = {Embedding Privacy Into Design Through Software Developers: Challenges
                  and Solutions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {1},
  pages        = {49--57},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2022.3204364},
  doi          = {10.1109/MSEC.2022.3204364},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/TahaeiVR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/TorresAriasGM23,
  author       = {Santiago Torres{-}Arias and
                  Daniel E. Geer and
                  John Speed Meyers},
  title        = {A Viewpoint on Knowing Software: Bill of Materials Quality When You
                  See It},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {6},
  pages        = {50--54},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3315887},
  doi          = {10.1109/MSEC.2023.3315887},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/TorresAriasGM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/TrueA23,
  author       = {John True and
                  Navid Asadizanjani},
  title        = {Physical Inspection and Attacks on Electronics: An Academic Course
                  for the Hardware Cybersecurity Workforce},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {2},
  pages        = {63--69},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3236999},
  doi          = {10.1109/MSEC.2023.3236999},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/TrueA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/TurnerMU23,
  author       = {Adam Brian Turner and
                  Stephen McCombie and
                  Allon J. Uhlmann},
  title        = {Ransomware-Bitcoin Threat Intelligence Sharing Using Structured Threat
                  Information Expression},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {3},
  pages        = {47--57},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2022.3166282},
  doi          = {10.1109/MSEC.2022.3166282},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/TurnerMU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/WeirDP23,
  author       = {Charles Weir and
                  Anna Dyson and
                  Daniel Prince},
  title        = {Do You Speak Cyber? Talking Security With Developers of Health Systems
                  and Devices},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {1},
  pages        = {27--36},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2022.3221616},
  doi          = {10.1109/MSEC.2022.3221616},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/WeirDP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Wood23,
  author       = {Christopher A. Wood},
  title        = {Hot Topics in Security and Privacy Standardization at the {IETF} and
                  Beyond},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {2},
  pages        = {57--62},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3237071},
  doi          = {10.1109/MSEC.2023.3237071},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Wood23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/WuMDX23,
  author       = {Jingwei Wu and
                  Wanxi Mao and
                  Yuxin Deng and
                  Jinghong Xu},
  title        = {Child Safety and Data Privacy in Smart Homes With Speakers: Comparison
                  of Privacy Policies in the United States and China},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {5},
  pages        = {6--17},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2022.3187946},
  doi          = {10.1109/MSEC.2022.3187946},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/WuMDX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ZahanKHSW23,
  author       = {Nusrat Zahan and
                  Parth Kanakiya and
                  Brian Hambleton and
                  Shohanuzzaman Shohan and
                  Laurie A. Williams},
  title        = {OpenSSF Scorecard: On the Path Toward Ecosystem-Wide Automated Security
                  Metrics},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {6},
  pages        = {76--88},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3279773},
  doi          = {10.1109/MSEC.2023.3279773},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ZahanKHSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ZahanLTEW23,
  author       = {Nusrat Zahan and
                  Elizabeth Lin and
                  Mahzabin Tamanna and
                  William Enck and
                  Laurie A. Williams},
  title        = {Software Bills of Materials Are Required. Are We There Yet?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {2},
  pages        = {82--88},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3237100},
  doi          = {10.1109/MSEC.2023.3237100},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ZahanLTEW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Zurko23,
  author       = {Mary Ellen Zurko},
  title        = {Unusable Security for Attackers [From the Editors]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {6},
  pages        = {4--7},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3308648},
  doi          = {10.1109/MSEC.2023.3308648},
  timestamp    = {Fri, 24 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Zurko23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ZurkoH23,
  author       = {Mary Ellen Zurko and
                  Julie M. Haney},
  title        = {Usable Security and Privacy for Security and Privacy Workers},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {1},
  pages        = {8--10},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2022.3221855},
  doi          = {10.1109/MSEC.2022.3221855},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ZurkoH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics