Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ieeesp/ieeesp19.bht:"
@article{DBLP:journals/ieeesp/0001A021, author = {Zheng Yang and Sridhar Adepu and Jianying Zhou}, title = {Opportunities and Challenges in Securing Critical Infrastructures Through Cryptography}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {5}, pages = {57--65}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3090022}, doi = {10.1109/MSEC.2021.3090022}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/0001A021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/0001C21, author = {Bob Blakley and Lorrie Faith Cranor}, title = {A Discussion of Public Health, Trust, and Privacy With Susan Landau}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {5}, pages = {9--15}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3092956}, doi = {10.1109/MSEC.2021.3092956}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/0001C21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/AhmadC21, author = {Wajeeha Ahmad and David D. Clark}, title = {A Systems Approach Toward Addressing Anonymous Abuses: Technical and Policy Considerations}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {2}, pages = {38--47}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3046708}, doi = {10.1109/MSEC.2020.3046708}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/AhmadC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/AliALS21, author = {Sameed Ali and Prashant Anantharaman and Zephyr Lucas and Sean W. Smith}, title = {What We Have Here Is Failure to Validate: Summer of LangSec}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {3}, pages = {17--23}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3059167}, doi = {10.1109/MSEC.2021.3059167}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/AliALS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/AliEDMY21, author = {Suzan Ali and Mounir Elgharabawy and Quentin Duchaussoy and Mohammad Mannan and Amr M. Youssef}, title = {Parental Controls: Safer Internet Solutions or New Pitfalls?}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {36--46}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3076150}, doi = {10.1109/MSEC.2021.3076150}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/AliEDMY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/AmitSE21, author = {Guy Amit and Asaf Shabtai and Yuval Elovici}, title = {A Self-Healing Mechanism for Internet of Things Devices}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {1}, pages = {44--53}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3013207}, doi = {10.1109/MSEC.2020.3013207}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/AmitSE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin21, author = {Steven M. Bellovin}, title = {The Law and Lawful Hacking}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {4}, pages = {76}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3077374}, doi = {10.1109/MSEC.2021.3077374}, timestamp = {Wed, 14 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Ben-NetanelNSE21, author = {Raz Ben{-}Netanel and Ben Nassi and Adi Shamir and Yuval Elovici}, title = {Detecting Spying Drones}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {1}, pages = {65--73}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3034171}, doi = {10.1109/MSEC.2020.3034171}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Ben-NetanelNSE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BenalohFSTW21, author = {Josh Benaloh and Kammi Foote and Philip B. Stark and Vanessa Teague and Dan S. Wallach}, title = {VAULT-Style Risk-Limiting Audits and the Inyo County Pilot}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {4}, pages = {8--18}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3075107}, doi = {10.1109/MSEC.2021.3075107}, timestamp = {Wed, 14 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BenalohFSTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Benzel21, author = {Terry Benzel}, title = {Research and Industry Partnerships in Cybersecurity and Privacy Research: New Frontiers or Fueling the Tech Sector?}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {5}, pages = {4--7}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3094313}, doi = {10.1109/MSEC.2021.3094313}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Benzel21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bertino21, author = {Elisa Bertino}, title = {Attacks on Artificial Intelligence [Last Word]}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {1}, pages = {103--104}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3037619}, doi = {10.1109/MSEC.2020.3037619}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bertino21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bertino21a, author = {Elisa Bertino}, title = {Zero Trust Architecture: Does It Help?}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {5}, pages = {95--96}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3091195}, doi = {10.1109/MSEC.2021.3091195}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Bertino21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BlakleyC21, author = {Bob Blakley and Lorrie Faith Cranor}, title = {A Discussion of Election Security, Cryptography, and Exceptional Access With Michael Alan Specter}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {15--22}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3107769}, doi = {10.1109/MSEC.2021.3107769}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BlakleyC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BoechatRSBNAM21, author = {Francois Boechat and Gabriel Ribas and Lucas Senos and Miguel Angelo Bicudo and Mateus Schulz Nogueira and Leandro Pfleger de Aguiar and Daniel Sadoc Menasch{\'{e}}}, title = {Is Vulnerability Report Confidence Redundant? Pitfalls Using Temporal Risk Scores}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {4}, pages = {44--53}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3070978}, doi = {10.1109/MSEC.2021.3070978}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BoechatRSBNAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CampanileILMM21, author = {Lelio Campanile and Mauro Iacono and Alexander H. Levis and Fiammetta Marulli and Michele Mastroianni}, title = {Privacy Regulations, Smart Roads, Blockchain, and Liability Insurance: Putting Technologies to Work}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {1}, pages = {34--43}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3012059}, doi = {10.1109/MSEC.2020.3012059}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/CampanileILMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Cristofaro21, author = {Emiliano De Cristofaro}, title = {A Critical Overview of Privacy in Machine Learning}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {4}, pages = {19--27}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3076443}, doi = {10.1109/MSEC.2021.3076443}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Cristofaro21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CunninghamCLSF21, author = {Robert K. Cunningham and Anita D. Carleton and Tom Longstaff and Forrest J. Shull and Deborah A. Frincke}, title = {A Research Road Map for Building Secure and Resilient Software-Intensive Systems}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {8--14}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3105876}, doi = {10.1109/MSEC.2021.3105876}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/CunninghamCLSF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/DasEKSW21, author = {Sauvik Das and W. Keith Edwards and DeBrae Kennedy{-}Mayo and Peter Swire and Yuxi Wu}, title = {Privacy for the People? Exploring Collective Action as a Mechanism to Shift Power to Consumers in End-User Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {5}, pages = {66--70}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3093135}, doi = {10.1109/MSEC.2021.3093135}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/DasEKSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/DengXS21, author = {Shuwen Deng and Wenjie Xiong and Jakub Szefer}, title = {Understanding the Insecurity of Processor Caches Due to Cache Timing-Based Vulnerabilities}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {3}, pages = {42--49}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3055799}, doi = {10.1109/MSEC.2021.3055799}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/DengXS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/DettmerOPSSZD21, author = {Amy Dettmer and Hamed Okhravi and Kevin Perry and Nabil Schear and Richard Shay and Mary Ellen Zurko and Paula J. Donovan}, title = {Lessons Learned From Designing a Security Architecture for Real-World Government Agencies}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {4}, pages = {28--36}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3069995}, doi = {10.1109/MSEC.2021.3069995}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/DettmerOPSSZD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/DragoniLMS21, author = {Nicola Dragoni and Alberto Lluch{-}Lafuente and Fabio Massacci and Anders Schlichtkrull}, title = {Are We Preparing Students to Build Security In? {A} Survey of European Cybersecurity in Higher Education Programs [Education]}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {1}, pages = {81--88}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3037446}, doi = {10.1109/MSEC.2020.3037446}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/DragoniLMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ElsayedLJ21, author = {Mahmoud Said Elsayed and Nhien{-}An Le{-}Khac and Anca Delia Jurcut}, title = {Dealing With {COVID-19} Network Traffic Spikes [Cybercrime and Forensics]}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {1}, pages = {90--94}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3037448}, doi = {10.1109/MSEC.2020.3037448}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ElsayedLJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/FarahmandGMN21, author = {Fariborz Farahmand and Jens Grossklags and Jelena Mirkovic and Bill Newhouse}, title = {Integrating Cybersecurity and Artificial Intelligence Research in Engineering and Computer Science Education}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {104--110}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3103460}, doi = {10.1109/MSEC.2021.3103460}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/FarahmandGMN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer21, author = {Daniel E. Geer Jr.}, title = {Auto-Update Considered Harmful}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {2}, pages = {79--80}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3050248}, doi = {10.1109/MSEC.2021.3050248}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer21a, author = {Daniel E. Geer Jr.}, title = {Convergence}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {123--124}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3106594}, doi = {10.1109/MSEC.2021.3106594}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GenkinY21, author = {Daniel Genkin and Yuval Yarom}, title = {Whack-a-Meltdown: Microarchitectural Security Games [Systems Attacks and Defenses]}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {1}, pages = {95--98}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3036146}, doi = {10.1109/MSEC.2020.3036146}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GenkinY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GueyeGBM21, author = {Assane Gueye and Carlos E. C. Galhardo and Irena Bojanova and Peter Mell}, title = {A Decade of Reoccurring Software Weaknesses}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {74--82}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3082757}, doi = {10.1109/MSEC.2021.3082757}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/GueyeGBM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/HaneyLJ21, author = {Julie M. Haney and Wayne G. Lutters and Jody L. Jacobs}, title = {Cybersecurity Advocates: Force Multipliers in Security Behavior Change}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {4}, pages = {54--59}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3077405}, doi = {10.1109/MSEC.2021.3077405}, timestamp = {Tue, 21 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/HaneyLJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/HerzbergLSVWZ21, author = {Amir Herzberg and Hemi Leibowitz and Kent E. Seamons and Elham Vaziripour and Justin Wu and Daniel Zappala}, title = {Secure Messaging Authentication Ceremonies Are Broken}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {2}, pages = {29--37}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3039727}, doi = {10.1109/MSEC.2020.3039727}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/HerzbergLSVWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/HussainRK21, author = {Siam U. Hussain and M. Sadegh Riazi and Farinaz Koushanfar}, title = {The Fusion of Secure Function Evaluation and Logic Synthesis}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {2}, pages = {48--55}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3049062}, doi = {10.1109/MSEC.2020.3049062}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/HussainRK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Jaeger21, author = {Trent Jaeger}, title = {Toward Fail Safety for Security Decisions}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {4--7}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3096614}, doi = {10.1109/MSEC.2021.3096614}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Jaeger21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/JereFK21, author = {Malhar Jere and Tyler Farnan and Farinaz Koushanfar}, title = {A Taxonomy of Attacks on Federated Learning}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {2}, pages = {20--28}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3039941}, doi = {10.1109/MSEC.2020.3039941}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/JereFK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KimKKJK21, author = {Dongkwan Kim and Eunsoo Kim and Mingeun Kim and Yeongjin Jang and Yongdae Kim}, title = {Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {26--35}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3076226}, doi = {10.1109/MSEC.2021.3076226}, timestamp = {Thu, 23 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/KimKKJK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KingSTDPV21, author = {Samuel T. King and Nolen Scaife and Patrick Traynor and Zain ul Abi Din and Christian Peeters and Hari Venugopalan}, title = {Credit Card Fraud Is a Computer Security Problem}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {2}, pages = {65--69}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3050247}, doi = {10.1109/MSEC.2021.3050247}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/KingSTDPV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LeeCJ21, author = {Yu Tsung Lee and Haining Chen and Trent Jaeger}, title = {Demystifying Android's Scoped Storage Defense}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {5}, pages = {16--25}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3090564}, doi = {10.1109/MSEC.2021.3090564}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/LeeCJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LiaoWCHD21, author = {Song Liao and Christin Wilson and Long Cheng and Hongxin Hu and Huixing Deng}, title = {Problematic Privacy Policies of Voice Assistant Applications}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {66--73}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3082474}, doi = {10.1109/MSEC.2021.3082474}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/LiaoWCHD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MassacciJP21, author = {Fabio Massacci and Trent Jaeger and Sean Peisert}, title = {SolarWinds and the Challenges of Patching: Can We Ever Stop Dancing With the Devil?}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {2}, pages = {14--19}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3050433}, doi = {10.1109/MSEC.2021.3050433}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MassacciJP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MassacciN21, author = {Fabio Massacci and Chan Nam Ngo}, title = {Distributed Financial Exchanges: Security Challenges and Design Principles}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {1}, pages = {54--64}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.2994826}, doi = {10.1109/MSEC.2020.2994826}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/MassacciN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MassacciP21, author = {Fabio Massacci and Ivan Pashchenko}, title = {Technical Leverage: Dependencies Are a Mixed Blessing}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {3}, pages = {58--62}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3065627}, doi = {10.1109/MSEC.2021.3065627}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MassacciP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MenezesS21, author = {Alfred Menezes and Douglas Stebila}, title = {Challenges in Cryptography}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {2}, pages = {70--73}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3049730}, doi = {10.1109/MSEC.2021.3049730}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MenezesS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MenezesS21a, author = {Alfred Menezes and Douglas Stebila}, title = {End-to-End Security: When Do We Have It?}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {4}, pages = {60--64}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3077403}, doi = {10.1109/MSEC.2021.3077403}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MenezesS21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MenezesS21b, author = {Alfred Menezes and Douglas Stebila}, title = {The Advanced Encryption Standard: 20 Years Later}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {98--102}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3107078}, doi = {10.1109/MSEC.2021.3107078}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MenezesS21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Michael21, author = {James Bret Michael}, title = {Security and Privacy for Edge Artificial Intelligence}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {4}, pages = {4--7}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3078304}, doi = {10.1109/MSEC.2021.3078304}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Michael21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MinnaBR0M21, author = {Francesco Minna and Agathe Blaise and Filippo Rebecchi and Balakrishnan Chandrasekaran and Fabio Massacci}, title = {Understanding the Security Implications of Kubernetes Networking}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {5}, pages = {46--56}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3094726}, doi = {10.1109/MSEC.2021.3094726}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MinnaBR0M21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MohammedKF21, author = {Sabah Mohammed and Tai{-}Hoon Kim and Wai{-}Chi Fang}, title = {Requirements for Security, Privacy, and Trust in the Internet of Things [Guest Editors' Introduction]}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {1}, pages = {8--10}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3037624}, doi = {10.1109/MSEC.2020.3037624}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/MohammedKF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Mussington21, author = {David Mussington}, title = {Calculating Risks: Understanding the 2020 Election Experience and Defining the "New Normal"}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {1}, pages = {74--80}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3038329}, doi = {10.1109/MSEC.2020.3038329}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Mussington21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Nicol21, author = {David M. Nicol}, title = {Message from {IEEE} S{\&}P's Outgoing Editor in Chief}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {1}, pages = {10}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3037626}, doi = {10.1109/MSEC.2020.3037626}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Nicol21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Nicol21a, author = {David M. Nicol}, title = {The Ransomware Threat to Energy-Delivery Systems}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {3}, pages = {24--32}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3063678}, doi = {10.1109/MSEC.2021.3063678}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Nicol21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Okhravi21, author = {Hamed Okhravi}, title = {A Cybersecurity Moonshot}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {3}, pages = {8--16}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3059438}, doi = {10.1109/MSEC.2021.3059438}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Okhravi21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Oorschot21, author = {Paul C. van Oorschot}, title = {Toward Unseating the Unsafe {C} Programming Language}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {2}, pages = {4--6}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3048766}, doi = {10.1109/MSEC.2020.3048766}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Oorschot21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Oorschot21a, author = {Paul C. van Oorschot}, title = {Coevolution of Security's Body of Knowledge and Curricula}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {5}, pages = {83--89}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3093735}, doi = {10.1109/MSEC.2021.3093735}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Oorschot21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ParkCK21, author = {Sangchul Park and Gina J. Choi and Haksoo Ko}, title = {Privacy in the Time of {COVID-19:} Divergent Paths for Contact Tracing and Route-Disclosure Mechanisms in South Korea}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {3}, pages = {51--56}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3066024}, doi = {10.1109/MSEC.2021.3066024}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/ParkCK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Peisert21, author = {Sean Peisert}, title = {Reflections on the Past, Perspectives on the Future [From the Editors]}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {1}, pages = {4--7}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3034670}, doi = {10.1109/MSEC.2020.3034670}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Peisert21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PeisertSOMBLMMP21, author = {Sean Peisert and Bruce Schneier and Hamed Okhravi and Fabio Massacci and Terry Benzel and Carl E. Landwehr and Mohammad Mannan and Jelena Mirkovic and Atul Prakash and James Bret Michael}, title = {Perspectives on the SolarWinds Incident}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {2}, pages = {7--13}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3051235}, doi = {10.1109/MSEC.2021.3051235}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/PeisertSOMBLMMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PolonetskySE21, author = {Jules Polonetsky and Tim Sparapani and Khaled El Emam}, title = {A Review of the Privacy-Enhancing Technologies Software Market}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {119--122}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3108295}, doi = {10.1109/MSEC.2021.3108295}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/PolonetskySE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PujolMGLS21, author = {David Pujol and Ashwin Machanavajjhala}, title = {Equity and Privacy: More Than Just a Tradeoff}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {93--97}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3105773}, doi = {10.1109/MSEC.2021.3105773}, timestamp = {Mon, 27 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/PujolMGLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RahmanW21, author = {Akond Rahman and Laurie A. Williams}, title = {Different Kind of Smells: Security Smells in Infrastructure as Code Scripts}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {3}, pages = {33--41}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3065190}, doi = {10.1109/MSEC.2021.3065190}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/RahmanW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RamosMS21, author = {Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and Sara Nieves Matheu{-}Garc{\'{\i}}a and Antonio F. Skarmeta}, title = {The Challenges of Software Cybersecurity Certification [Building Security In]}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {1}, pages = {99--102}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3037845}, doi = {10.1109/MSEC.2020.3037845}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/RamosMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RamosMSANSB21, author = {Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and Juan A. Mart{\'{\i}}nez and Vincenzo Savarino and Marco Angelini and Vincenzo Napolitano and Antonio F. Skarmeta and Gianmarco Baldini}, title = {Security and Privacy in Internet of Things-Enabled Smart Cities: Challenges and Future Directions}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {1}, pages = {12--23}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3012353}, doi = {10.1109/MSEC.2020.3012353}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/RamosMSANSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RuanXJWSH21, author = {Wenqiang Ruan and Mingxin Xu and Haoyang Jia and Zhenhuan Wu and Lushan Song and Weili Han}, title = {Privacy Compliance: Can Technology Come to the Rescue?}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {4}, pages = {37--43}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3078218}, doi = {10.1109/MSEC.2021.3078218}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/RuanXJWSH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Sanderson21, author = {Pollyanna Sanderson}, title = {Balancing Public Health and Civil Liberties: Privacy Aspects of Contact-Tracing Technologies}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {4}, pages = {65--69}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3077785}, doi = {10.1109/MSEC.2021.3077785}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Sanderson21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SanzoSW21, author = {Karen L. Sanzo and Jay Paredes Scribner and Hongyi Wu}, title = {Designing a {K-16} Cybersecurity Collaborative: {CIPHER}}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {2}, pages = {56--59}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3050246}, doi = {10.1109/MSEC.2021.3050246}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/SanzoSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Schneier21, author = {Bruce Schneier}, title = {What Will It Take?}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {3}, pages = {63--64}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3063800}, doi = {10.1109/MSEC.2021.3063800}, timestamp = {Thu, 27 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Schneier21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ShiWCS21, author = {Cong Shi and Yan Wang and Yingying (Jennifer) Chen and Nitesh Saxena}, title = {Authentication of Voice Commands by Leveraging Vibrations in Wearables}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {83--92}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3077205}, doi = {10.1109/MSEC.2021.3077205}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ShiWCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Simioni21, author = {Marco Simioni}, title = {Investigative Techniques for the De-Anonymization of Hidden Services}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {2}, pages = {60--64}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3050245}, doi = {10.1109/MSEC.2021.3050245}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Simioni21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SkopikWL21, author = {Florian Skopik and Markus Wurzenberger and Max Landauer}, title = {The Seven Golden Principles of Effective Anomaly-Based Intrusion Detection}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {5}, pages = {36--45}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3090444}, doi = {10.1109/MSEC.2021.3090444}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/SkopikWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SpringHHMS21, author = {Jonathan M. Spring and Eric Hatleback and Allen D. Householder and Art Manion and Deana Shick}, title = {Time to Change the CVSS?}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {2}, pages = {74--78}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3044475}, doi = {10.1109/MSEC.2020.3044475}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/SpringHHMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Stalla-Bourdillon21, author = {Sophie Stalla{-}Bourdillon}, title = {A Maturity Spectrum for Data Institutions}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {5}, pages = {90--94}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3094985}, doi = {10.1109/MSEC.2021.3094985}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Stalla-Bourdillon21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/StarkDOBEKS21, author = {Emily Stark and Joe DeBlasio and Devon O'Brien and Davide Balzarotti and William Enck and Samuel King and Angelos Stavrou}, title = {Certificate Transparency in Google Chrome: Past, Present, and Future}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {112--118}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3103461}, doi = {10.1109/MSEC.2021.3103461}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/StarkDOBEKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TaylorKZ21, author = {Blair Taylor and Sidd Kaza and Paige A. Zaleppa}, title = {{CLARK:} {A} Design Science Research Project for Building and Sharing High-Quality Cybersecurity Curricula}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {5}, pages = {72--76}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3093136}, doi = {10.1109/MSEC.2021.3093136}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/TaylorKZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TrestianXLCBBJC21, author = {Ramona Trestian and Guodong Xie and Pintu Lohar and Edoardo Celeste and Malika Bendechache and Rob Brennan and Evgeniia Jayasekera and Regina Connolly and Irina Tal}, title = {Privacy in a Time of {COVID-19:} How Concerned Are You?}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {5}, pages = {26--35}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3092607}, doi = {10.1109/MSEC.2021.3092607}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/TrestianXLCBBJC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TumaW21, author = {Katja Tuma and Mathias Widman}, title = {Seven Pain Points of Threat Analysis and Risk Assessment in the Automotive Domain}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {5}, pages = {78--82}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3093137}, doi = {10.1109/MSEC.2021.3093137}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/TumaW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/VaidyaM21, author = {Binod Vaidya and Hussein T. Mouftah}, title = {Security for Shared Electric and Automated Mobility Services in Smart Cities}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {1}, pages = {24--33}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3013759}, doi = {10.1109/MSEC.2020.3013759}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/VaidyaM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Vetillard21, author = {Eric V{\'{e}}tillard}, title = {Security Certification: Is It Box Ticking?}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {4}, pages = {70--74}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3077401}, doi = {10.1109/MSEC.2021.3077401}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Vetillard21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/WieflingDI21, author = {Stephan Wiefling and Markus D{\"{u}}rmuth and Luigi Lo Iacono}, title = {Verify It's You: How Users Perceive Risk-Based Authentication}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {47--57}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3077954}, doi = {10.1109/MSEC.2021.3077954}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/WieflingDI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Williams21, author = {Laurie A. Williams}, title = {The People Who Live in Glass Houses Are Happy the Stones Weren't Thrown at Them [From the Editors]}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {3}, pages = {4--7}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3065723}, doi = {10.1109/MSEC.2021.3065723}, timestamp = {Thu, 27 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Williams21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/YagemannCURSL21, author = {Carter Yagemann and Simon Pak Ho Chung and Erkam Uzun and Sai Ragam and Brendan Saltaformaggio and Wenke Lee}, title = {Modeling Large-Scale Manipulation in Open Stock Markets}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {58--65}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3076717}, doi = {10.1109/MSEC.2021.3076717}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/YagemannCURSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/YaoB21, author = {Danfeng Daphne Yao and Terry Benzel}, title = {{ACSAC} 2020: Furthering the Quest to Tackle Hard Problems and Find Practical Solutions}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {23--24}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3106595}, doi = {10.1109/MSEC.2021.3106595}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/YaoB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.