Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ieeesp/ieeesp21.bht:"
@article{DBLP:journals/ieeesp/AdamosFG23, author = {Konstantinos Adamos and Fabio Di Franco and Athanasios Vasileios Grammatopoulos}, title = {An Analysis of European Union Cybersecurity Higher Education Programs Through the Crowd-Sourced Database CyberHEAD}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {5}, pages = {85--94}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3299348}, doi = {10.1109/MSEC.2023.3299348}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/AdamosFG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ArpQPWPWCR23, author = {Daniel Arp and Erwin Quiring and Feargus Pendlebury and Alexander Warnecke and Fabio Pierazzi and Christian Wressnegger and Lorenzo Cavallaro and Konrad Rieck}, title = {Lessons Learned on Machine Learning for Computer Security}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {5}, pages = {72--77}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3287207}, doi = {10.1109/MSEC.2023.3287207}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/ArpQPWPWCR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/AyubJQA23, author = {Adeen Ayub and Wooyeon Jo and Syed Ali Qasim and Irfan Ahmed}, title = {How Are Industrial Control Systems Insecure by Design? {A} Deeper Insight Into Real-World Programmable Logic Controllers}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {4}, pages = {10--19}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3271273}, doi = {10.1109/MSEC.2023.3271273}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/AyubJQA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BalliuBBEMASSSW23, author = {Musard Balliu and Benoit Baudry and Sofia Bobadilla and Mathias Ekstedt and Martin Monperrus and Javier Ron Arteaga and Aman Sharma and Gabriel Skoglund and C{\'{e}}sar Soto{-}Valero and Martin Wittlinger}, title = {Challenges of Producing Software Bill of Materials for Java}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {6}, pages = {12--23}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3302956}, doi = {10.1109/MSEC.2023.3302956}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BalliuBBEMASSSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin23, author = {Steven M. Bellovin}, title = {Is Cybersecurity Liability a Liability?}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {4}, pages = {99--100}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3273461}, doi = {10.1109/MSEC.2023.3273461}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Benzel23, author = {Terry Benzel}, title = {Security and Privacy Research Artifacts: Are We Making Progress?}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {1}, pages = {4--6}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3222887}, doi = {10.1109/MSEC.2022.3222887}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Benzel23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BenzelO23, author = {Terry Benzel and Hilarie Orman}, title = {{IEEE} Security and Privacy Symposium in the Year 2003}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {2}, pages = {43--47}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3237103}, doi = {10.1109/MSEC.2023.3237103}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BenzelO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bertino23, author = {Elisa Bertino}, title = {Privacy in the Era of 5G, IoT, Big Data, and Machine Learning}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {1}, pages = {91--92}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3221171}, doi = {10.1109/MSEC.2022.3221171}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bertino23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BlakleyC23, author = {Bob Blakley and Lorrie Cranor}, title = {Katie Moussouris: Vulnerability Disclosure and Security Workforce Development}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {1}, pages = {11--18}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3222043}, doi = {10.1109/MSEC.2022.3222043}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BlakleyC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BlakleyC23a, author = {Bob Blakley and Lorrie Cranor}, title = {A 20th Anniversary Episode Chat With S{\&}P Editors George Cybenko, Carl Landwehr, Shari Lawrence Pfleeger, and Sean Peisert}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {2}, pages = {9--16}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3239179}, doi = {10.1109/MSEC.2023.3239179}, timestamp = {Tue, 25 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BlakleyC23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BurbanoGLCS23, author = {Luis Burbano and Kunal Garg and Santiago J. Leudo and Alvaro A. C{\'{a}}rdenas and Ricardo G. Sanfelice}, title = {Online Attack Recovery in Cyberphysical Systems}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {4}, pages = {20--28}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3268573}, doi = {10.1109/MSEC.2023.3268573}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BurbanoGLCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CavallaroKPP23, author = {Lorenzo Cavallaro and Johannes Kinder and Feargus Pendlebury and Fabio Pierazzi}, title = {Are Machine Learning Models for Malware Detection Ready for Prime Time?}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {2}, pages = {53--56}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3236543}, doi = {10.1109/MSEC.2023.3236543}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/CavallaroKPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CiclosiM23, author = {Francesco Ciclosi and Fabio Massacci}, title = {The Data Protection Officer: {A} Ubiquitous Role That No One Really Knows}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {1}, pages = {66--77}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3222115}, doi = {10.1109/MSEC.2022.3222115}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/CiclosiM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CiocarlieZ23, author = {Gabriela F. Ciocarlie and Jianying Zhou}, title = {Securing Critical Infrastructure Across Cyber and Physical Dimensions}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {4}, pages = {9}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3282424}, doi = {10.1109/MSEC.2023.3282424}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/CiocarlieZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Cowan23, author = {Crispin Cowan}, title = {Open and Closed Software Security Redux}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {2}, pages = {18--23}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3227819}, doi = {10.1109/MSEC.2022.3227819}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Cowan23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/DoumanidisXRPSZM23, author = {Constantine Doumanidis and Yongyu Xie and Prashant Hari Narayan Rajput and Ryan Pickren and Burak Sahin and Saman Zonouz and Michail Maniatakos}, title = {Dissecting the Industrial Control Systems Software Supply Chain}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {4}, pages = {39--50}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3266775}, doi = {10.1109/MSEC.2023.3266775}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/DoumanidisXRPSZM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/EckhartEAACJNRY23, author = {Matthias Eckhart and Andreas Ekelhart and David Allison and Magnus Almgren and Katharina Ceesay{-}Seitz and Helge Janicke and Simin Nadjm{-}Tehrani and Awais Rashid and Mark Yampolskiy}, title = {Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {6}, pages = {64--75}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3271225}, doi = {10.1109/MSEC.2023.3271225}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/EckhartEAACJNRY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/FazelniaOM23, author = {Mohamad Fazelnia and Ahmet Okutan and Mehdi Mirakhorli}, title = {Supporting Artificial Intelligence/Machine Learning Security Workers Through an Adversarial Techniques, Tools, and Common Knowledge Framework}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {1}, pages = {37--48}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3221058}, doi = {10.1109/MSEC.2022.3221058}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/FazelniaOM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/FourneWFA23, author = {Marcel Fourn{\'{e}} and Dominik Wermke and Sascha Fahl and Yasemin Acar}, title = {A Viewpoint on Human Factors in Software Supply Chain Security: {A} Research Agenda}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {6}, pages = {59--63}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3316569}, doi = {10.1109/MSEC.2023.3316569}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/FourneWFA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer23, author = {Daniel E. Geer}, title = {Whither Software?}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {2}, pages = {89--90}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3236541}, doi = {10.1109/MSEC.2023.3236541}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer23a, author = {Daniel E. Geer}, title = {Convergence: Ongoing}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {5}, pages = {95--96}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3295439}, doi = {10.1109/MSEC.2023.3295439}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GorskiIS23, author = {Peter Leo Gorski and Luigi Lo Iacono and Matthew Smith}, title = {Eight Lightweight Usable Security Principles for Developers}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {1}, pages = {20--26}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3205484}, doi = {10.1109/MSEC.2022.3205484}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/GorskiIS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Gradon23, author = {Kacper T. Gradon}, title = {Electric Sheep on the Pastures of Disinformation and Targeted Phishing Campaigns: The Security Implications of ChatGPT}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {3}, pages = {58--61}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3255039}, doi = {10.1109/MSEC.2023.3255039}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Gradon23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Jaeger23, author = {Trent Jaeger}, title = {On Bridges and Software}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {3}, pages = {4--5}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3258207}, doi = {10.1109/MSEC.2023.3258207}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Jaeger23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/JaegerKMS23, author = {Trent Jaeger and Brent ByungHoon Kang and Nele Mentens and Cynthia Sturton}, title = {Impact of Emerging Hardware on Security and Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {3}, pages = {6--7}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3258206}, doi = {10.1109/MSEC.2023.3258206}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/JaegerKMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KerschbaumL23, author = {Florian Kerschbaum and Nils Lukas}, title = {Privacy-Preserving Machine Learning [Cryptography]}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {6}, pages = {90--94}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3315944}, doi = {10.1109/MSEC.2023.3315944}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/KerschbaumL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Kohno23, author = {Tadayoshi Kohno}, title = {\{In Earth\} Until (Ready)}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {2}, pages = {7--8}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3237099}, doi = {10.1109/MSEC.2023.3237099}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Kohno23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Kohno23a, author = {Tadayoshi Kohno}, title = {In Your Eyes}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {5}, pages = {4--5}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3295440}, doi = {10.1109/MSEC.2023.3295440}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Kohno23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KrishnanCLBK23, author = {Padmanabhan Krishnan and Cristina Cifuentes and Li Li and Tegawend{\'{e}} F. Bissyand{\'{e}} and Jacques Klein}, title = {Why Is Static Application Security Testing Hard to Learn?}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {5}, pages = {68--72}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3287206}, doi = {10.1109/MSEC.2023.3287206}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/KrishnanCLBK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LacosteL23, author = {Marc Lacoste and Vincent Lefebvre}, title = {Trusted Execution Environments for Telecoms: Strengths, Weaknesses, Opportunities, and Threats}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {3}, pages = {37--46}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3259801}, doi = {10.1109/MSEC.2023.3259801}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/LacosteL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LadisaPSMB23, author = {Piergiorgio Ladisa and Serena Elisa Ponta and Antonino Sabetta and Matias Martinez and Olivier Barais}, title = {Journey to the Center of Software Supply Chain Attacks}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {6}, pages = {34--49}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3302066}, doi = {10.1109/MSEC.2023.3302066}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/LadisaPSMB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LandwehrRWTJKK23, author = {Carl E. Landwehr and Michael K. Reiter and Laurie A. Williams and Gene Tsudik and Trent Jaeger and Tadayoshi Kohno and Apu Kapadia}, title = {Looking Backwards (and Forwards): {NSF} Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {2}, pages = {32--42}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3208721}, doi = {10.1109/MSEC.2022.3208721}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/LandwehrRWTJKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LipnerH23, author = {Steve Lipner and Michael Howard}, title = {Inside the Windows Security Push: {A} Twenty-Year Retrospective}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {2}, pages = {24--31}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3228098}, doi = {10.1109/MSEC.2022.3228098}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/LipnerH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MajeedH23, author = {Abdul Majeed and Seong Oun Hwang}, title = {Rectification of Syntactic and Semantic Privacy Mechanisms}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {5}, pages = {18--32}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3188365}, doi = {10.1109/MSEC.2022.3188365}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/MajeedH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Malkin23, author = {Nathan Malkin}, title = {Contextual Integrity, Explained: {A} More Usable Privacy Definition}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {1}, pages = {58--65}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3201585}, doi = {10.1109/MSEC.2022.3201585}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Malkin23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MassacciW23, author = {Fabio Massacci and Laurie A. Williams}, title = {Software Supply Chain Security [Guest Editors' Introduction]}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {6}, pages = {8--10}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3321189}, doi = {10.1109/MSEC.2023.3321189}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/MassacciW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Mathur23, author = {Aditya P. Mathur}, title = {Reconfigurable Digital Twin to Support Research, Education, and Training in the Defense of Critical Infrastructure}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {4}, pages = {51--60}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3281272}, doi = {10.1109/MSEC.2023.3281272}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Mathur23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MelaraT23, author = {Marcela S. Melara and Santiago Torres{-}Arias}, title = {A Viewpoint on Software Supply Chain Security: Are We Getting Lost in Translation?}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {6}, pages = {55--58}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3316568}, doi = {10.1109/MSEC.2023.3316568}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/MelaraT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MezaRORK23, author = {Andres Meza and Francesco Restuccia and Jason Oberg and Dominic Rizzo and Ryan Kastner}, title = {Security Verification of the OpenTitan Hardware Root of Trust}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {3}, pages = {27--36}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3251954}, doi = {10.1109/MSEC.2023.3251954}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MezaRORK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MilankovichT23, author = {{\'{A}}kos Mil{\'{a}}nkovich and Katja Tuma}, title = {Delta Security Certification for Software Supply Chains}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {6}, pages = {24--33}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3311464}, doi = {10.1109/MSEC.2023.3311464}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/MilankovichT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/NanayakkaraH23, author = {Priyanka Nanayakkara and Jessica Hullman}, title = {What's Driving Conflicts Around Differential Privacy for the {U.S.} Census}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {5}, pages = {33--42}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3202793}, doi = {10.1109/MSEC.2022.3202793}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/NanayakkaraH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/NarayananB23, author = {Vikram Narayanan and Anton Burtsev}, title = {The Opportunities and Limitations of Extended Page Table Switching for Fine-Grained Isolation}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {3}, pages = {16--26}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3251385}, doi = {10.1109/MSEC.2023.3251385}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/NarayananB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/NarayananL23, author = {Arvind Narayanan and Kevin Lee}, title = {Security Policy Audits: Why and How}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {2}, pages = {77--81}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3236540}, doi = {10.1109/MSEC.2023.3236540}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/NarayananL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/NicolSABCL23, author = {David M. Nicol and Gregory Shannon and Monika Akbar and Matt Bishop and Michael M. Chaney and Matthew E. Luallen}, title = {Toward Common Weakness Enumerations in Industrial Control Systems}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {4}, pages = {84--93}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3279515}, doi = {10.1109/MSEC.2023.3279515}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/NicolSABCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ObermeierJRUH23, author = {Sebastian Obermeier and Thomas J{\"{o}}sler and Stephan Renggli and Maurus Untern{\"{a}}hrer and Bernhard M. H{\"{a}}mmerli}, title = {Automating Recovery in Mixed Operation Technology/IT Critical Infrastructures}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {5}, pages = {43--54}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3264595}, doi = {10.1109/MSEC.2023.3264595}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/ObermeierJRUH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Oorschot23, author = {Paul C. van Oorschot}, title = {Memory Errors and Memory Safety: {C} as a Case Study}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {2}, pages = {70--76}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3236542}, doi = {10.1109/MSEC.2023.3236542}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Oorschot23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Oorschot23a, author = {Paul C. van Oorschot}, title = {Memory Errors and Memory Safety: {A} Look at Java and Rust}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {3}, pages = {62--68}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3249719}, doi = {10.1109/MSEC.2023.3249719}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Oorschot23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ParkLK23, author = {Soyeon Park and Sangho Lee and Taesoo Kim}, title = {Memory Protection Keys: Facts, Key Extension Perspectives, and Discussions}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {3}, pages = {8--15}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3250601}, doi = {10.1109/MSEC.2023.3250601}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/ParkLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ParkS23, author = {Sungmi Park and Douglas Stebila}, title = {The Future of Digital Investigation: Automated Legal Inference}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {1}, pages = {84--90}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3223187}, doi = {10.1109/MSEC.2022.3223187}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ParkS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Peisert23, author = {Sean Peisert}, title = {The First 20 Years of {IEEE} Security {\&} Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {2}, pages = {4--6}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3236420}, doi = {10.1109/MSEC.2023.3236420}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Peisert23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Peisert23a, author = {Sean Peisert}, title = {On Software Infrastructure: Develop, Prove, Profit?}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {4}, pages = {4--8}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3273492}, doi = {10.1109/MSEC.2023.3273492}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Peisert23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Piessens23, author = {Frank Piessens}, title = {Transient Execution Attacks}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {5}, pages = {79--84}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3299349}, doi = {10.1109/MSEC.2023.3299349}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Piessens23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RedmilesBK23, author = {Elissa M. Redmiles and Mia M. Bennett and Tadayoshi Kohno}, title = {Power in Computer Security and Privacy: {A} Critical Lens}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {2}, pages = {48--52}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3238591}, doi = {10.1109/MSEC.2023.3238591}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/RedmilesBK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RomanALS23, author = {Rodrigo Roman and Cristina Alcaraz and Javier L{\'{o}}pez and Kouichi Sakurai}, title = {Current Perspectives on Securing Critical Infrastructures' Supply Chains}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {4}, pages = {29--38}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3247946}, doi = {10.1109/MSEC.2023.3247946}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/RomanALS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RuzomberkaLBGWP23, author = {Eric Ruzomberka and David J. Love and Christopher G. Brinton and Arpit Gupta and Chih{-}Chun Wang and H. Vincent Poor}, title = {Challenges and Opportunities for Beyond-5G Wireless Security}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {5}, pages = {55--66}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3251888}, doi = {10.1109/MSEC.2023.3251888}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/RuzomberkaLBGWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SarieddineSJADA23, author = {Khaled Sarieddine and Mohammad Ali Sayed and Danial Jafarigiv and Ribal Atallah and Mourad Debbabi and Chadi Assi}, title = {A Real-Time Cosimulation Testbed for Electric Vehicle Charging and Smart Grid Security}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {4}, pages = {74--83}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3247374}, doi = {10.1109/MSEC.2023.3247374}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/SarieddineSJADA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Schneier23, author = {Bruce Schneier}, title = {Trustworthy {AI} Means Public {AI} [Last Word]}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {6}, pages = {95--96}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3301262}, doi = {10.1109/MSEC.2023.3301262}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Schneier23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Shostack23, author = {Adam Shostack}, title = {Nothing Is Good Enough: Fast and Cheap Are Undervalued as Influencers of Security Tool Adoption}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {1}, pages = {78--83}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3223551}, doi = {10.1109/MSEC.2022.3223551}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Shostack23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Smart23, author = {Nigel P. Smart}, title = {Computing on Encrypted Data}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {4}, pages = {94--98}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3279517}, doi = {10.1109/MSEC.2023.3279517}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Smart23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/StrohmeierLMRSL23, author = {Martin Strohmeier and Mauro Leonardi and Sergei Markochev and Fabio Ricciato and Matthias Sch{\"{a}}fer and Vincent Lenders}, title = {In Pursuit of Aviation Cybersecurity: Experiences and Lessons From a Competitive Approach}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {4}, pages = {61--73}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3265523}, doi = {10.1109/MSEC.2023.3265523}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/StrohmeierLMRSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TahaeiVR23, author = {Mohammad Tahaei and Kami Vaniea and Awais Rashid}, title = {Embedding Privacy Into Design Through Software Developers: Challenges and Solutions}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {1}, pages = {49--57}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3204364}, doi = {10.1109/MSEC.2022.3204364}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/TahaeiVR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TorresAriasGM23, author = {Santiago Torres{-}Arias and Daniel E. Geer and John Speed Meyers}, title = {A Viewpoint on Knowing Software: Bill of Materials Quality When You See It}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {6}, pages = {50--54}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3315887}, doi = {10.1109/MSEC.2023.3315887}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/TorresAriasGM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TrueA23, author = {John True and Navid Asadizanjani}, title = {Physical Inspection and Attacks on Electronics: An Academic Course for the Hardware Cybersecurity Workforce}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {2}, pages = {63--69}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3236999}, doi = {10.1109/MSEC.2023.3236999}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/TrueA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TurnerMU23, author = {Adam Brian Turner and Stephen McCombie and Allon J. Uhlmann}, title = {Ransomware-Bitcoin Threat Intelligence Sharing Using Structured Threat Information Expression}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {3}, pages = {47--57}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3166282}, doi = {10.1109/MSEC.2022.3166282}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/TurnerMU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/WeirDP23, author = {Charles Weir and Anna Dyson and Daniel Prince}, title = {Do You Speak Cyber? Talking Security With Developers of Health Systems and Devices}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {1}, pages = {27--36}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3221616}, doi = {10.1109/MSEC.2022.3221616}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/WeirDP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Wood23, author = {Christopher A. Wood}, title = {Hot Topics in Security and Privacy Standardization at the {IETF} and Beyond}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {2}, pages = {57--62}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3237071}, doi = {10.1109/MSEC.2023.3237071}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Wood23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/WuMDX23, author = {Jingwei Wu and Wanxi Mao and Yuxin Deng and Jinghong Xu}, title = {Child Safety and Data Privacy in Smart Homes With Speakers: Comparison of Privacy Policies in the United States and China}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {5}, pages = {6--17}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3187946}, doi = {10.1109/MSEC.2022.3187946}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/WuMDX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ZahanKHSW23, author = {Nusrat Zahan and Parth Kanakiya and Brian Hambleton and Shohanuzzaman Shohan and Laurie A. Williams}, title = {OpenSSF Scorecard: On the Path Toward Ecosystem-Wide Automated Security Metrics}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {6}, pages = {76--88}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3279773}, doi = {10.1109/MSEC.2023.3279773}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ZahanKHSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ZahanLTEW23, author = {Nusrat Zahan and Elizabeth Lin and Mahzabin Tamanna and William Enck and Laurie A. Williams}, title = {Software Bills of Materials Are Required. Are We There Yet?}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {2}, pages = {82--88}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3237100}, doi = {10.1109/MSEC.2023.3237100}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/ZahanLTEW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Zurko23, author = {Mary Ellen Zurko}, title = {Unusable Security for Attackers [From the Editors]}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {6}, pages = {4--7}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3308648}, doi = {10.1109/MSEC.2023.3308648}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Zurko23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ZurkoH23, author = {Mary Ellen Zurko and Julie M. Haney}, title = {Usable Security and Privacy for Security and Privacy Workers}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {1}, pages = {8--10}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3221855}, doi = {10.1109/MSEC.2022.3221855}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ZurkoH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.