Search dblp for Publications

export results for "toc:db/journals/ieeesp/ieeesp19.bht:"

 download as .bib file

@article{DBLP:journals/ieeesp/0001A021,
  author       = {Zheng Yang and
                  Sridhar Adepu and
                  Jianying Zhou},
  title        = {Opportunities and Challenges in Securing Critical Infrastructures
                  Through Cryptography},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {5},
  pages        = {57--65},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3090022},
  doi          = {10.1109/MSEC.2021.3090022},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/0001A021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/0001C21,
  author       = {Bob Blakley and
                  Lorrie Faith Cranor},
  title        = {A Discussion of Public Health, Trust, and Privacy With Susan Landau},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {5},
  pages        = {9--15},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3092956},
  doi          = {10.1109/MSEC.2021.3092956},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/0001C21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/AhmadC21,
  author       = {Wajeeha Ahmad and
                  David D. Clark},
  title        = {A Systems Approach Toward Addressing Anonymous Abuses: Technical and
                  Policy Considerations},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {2},
  pages        = {38--47},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3046708},
  doi          = {10.1109/MSEC.2020.3046708},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AhmadC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/AliALS21,
  author       = {Sameed Ali and
                  Prashant Anantharaman and
                  Zephyr Lucas and
                  Sean W. Smith},
  title        = {What We Have Here Is Failure to Validate: Summer of LangSec},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {3},
  pages        = {17--23},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3059167},
  doi          = {10.1109/MSEC.2021.3059167},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AliALS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/AliEDMY21,
  author       = {Suzan Ali and
                  Mounir Elgharabawy and
                  Quentin Duchaussoy and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {Parental Controls: Safer Internet Solutions or New Pitfalls?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {36--46},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3076150},
  doi          = {10.1109/MSEC.2021.3076150},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AliEDMY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/AmitSE21,
  author       = {Guy Amit and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {A Self-Healing Mechanism for Internet of Things Devices},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {1},
  pages        = {44--53},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3013207},
  doi          = {10.1109/MSEC.2020.3013207},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AmitSE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin21,
  author       = {Steven M. Bellovin},
  title        = {The Law and Lawful Hacking},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {4},
  pages        = {76},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3077374},
  doi          = {10.1109/MSEC.2021.3077374},
  timestamp    = {Wed, 14 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Ben-NetanelNSE21,
  author       = {Raz Ben{-}Netanel and
                  Ben Nassi and
                  Adi Shamir and
                  Yuval Elovici},
  title        = {Detecting Spying Drones},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {1},
  pages        = {65--73},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3034171},
  doi          = {10.1109/MSEC.2020.3034171},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Ben-NetanelNSE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BenalohFSTW21,
  author       = {Josh Benaloh and
                  Kammi Foote and
                  Philip B. Stark and
                  Vanessa Teague and
                  Dan S. Wallach},
  title        = {VAULT-Style Risk-Limiting Audits and the Inyo County Pilot},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {4},
  pages        = {8--18},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3075107},
  doi          = {10.1109/MSEC.2021.3075107},
  timestamp    = {Wed, 14 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BenalohFSTW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Benzel21,
  author       = {Terry Benzel},
  title        = {Research and Industry Partnerships in Cybersecurity and Privacy Research:
                  New Frontiers or Fueling the Tech Sector?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {5},
  pages        = {4--7},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3094313},
  doi          = {10.1109/MSEC.2021.3094313},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Benzel21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bertino21,
  author       = {Elisa Bertino},
  title        = {Attacks on Artificial Intelligence [Last Word]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {1},
  pages        = {103--104},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3037619},
  doi          = {10.1109/MSEC.2020.3037619},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bertino21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bertino21a,
  author       = {Elisa Bertino},
  title        = {Zero Trust Architecture: Does It Help?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {5},
  pages        = {95--96},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3091195},
  doi          = {10.1109/MSEC.2021.3091195},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bertino21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BlakleyC21,
  author       = {Bob Blakley and
                  Lorrie Faith Cranor},
  title        = {A Discussion of Election Security, Cryptography, and Exceptional Access
                  With Michael Alan Specter},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {15--22},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3107769},
  doi          = {10.1109/MSEC.2021.3107769},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BlakleyC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BoechatRSBNAM21,
  author       = {Francois Boechat and
                  Gabriel Ribas and
                  Lucas Senos and
                  Miguel Angelo Bicudo and
                  Mateus Schulz Nogueira and
                  Leandro Pfleger de Aguiar and
                  Daniel Sadoc Menasch{\'{e}}},
  title        = {Is Vulnerability Report Confidence Redundant? Pitfalls Using Temporal
                  Risk Scores},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {4},
  pages        = {44--53},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3070978},
  doi          = {10.1109/MSEC.2021.3070978},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BoechatRSBNAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CampanileILMM21,
  author       = {Lelio Campanile and
                  Mauro Iacono and
                  Alexander H. Levis and
                  Fiammetta Marulli and
                  Michele Mastroianni},
  title        = {Privacy Regulations, Smart Roads, Blockchain, and Liability Insurance:
                  Putting Technologies to Work},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {1},
  pages        = {34--43},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3012059},
  doi          = {10.1109/MSEC.2020.3012059},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CampanileILMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Cristofaro21,
  author       = {Emiliano De Cristofaro},
  title        = {A Critical Overview of Privacy in Machine Learning},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {4},
  pages        = {19--27},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3076443},
  doi          = {10.1109/MSEC.2021.3076443},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Cristofaro21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CunninghamCLSF21,
  author       = {Robert K. Cunningham and
                  Anita D. Carleton and
                  Tom Longstaff and
                  Forrest J. Shull and
                  Deborah A. Frincke},
  title        = {A Research Road Map for Building Secure and Resilient Software-Intensive
                  Systems},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {8--14},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3105876},
  doi          = {10.1109/MSEC.2021.3105876},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CunninghamCLSF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/DasEKSW21,
  author       = {Sauvik Das and
                  W. Keith Edwards and
                  DeBrae Kennedy{-}Mayo and
                  Peter Swire and
                  Yuxi Wu},
  title        = {Privacy for the People? Exploring Collective Action as a Mechanism
                  to Shift Power to Consumers in End-User Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {5},
  pages        = {66--70},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3093135},
  doi          = {10.1109/MSEC.2021.3093135},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/DasEKSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/DengXS21,
  author       = {Shuwen Deng and
                  Wenjie Xiong and
                  Jakub Szefer},
  title        = {Understanding the Insecurity of Processor Caches Due to Cache Timing-Based
                  Vulnerabilities},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {3},
  pages        = {42--49},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3055799},
  doi          = {10.1109/MSEC.2021.3055799},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/DengXS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/DettmerOPSSZD21,
  author       = {Amy Dettmer and
                  Hamed Okhravi and
                  Kevin Perry and
                  Nabil Schear and
                  Richard Shay and
                  Mary Ellen Zurko and
                  Paula J. Donovan},
  title        = {Lessons Learned From Designing a Security Architecture for Real-World
                  Government Agencies},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {4},
  pages        = {28--36},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3069995},
  doi          = {10.1109/MSEC.2021.3069995},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/DettmerOPSSZD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/DragoniLMS21,
  author       = {Nicola Dragoni and
                  Alberto Lluch{-}Lafuente and
                  Fabio Massacci and
                  Anders Schlichtkrull},
  title        = {Are We Preparing Students to Build Security In? {A} Survey of European
                  Cybersecurity in Higher Education Programs [Education]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {1},
  pages        = {81--88},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3037446},
  doi          = {10.1109/MSEC.2020.3037446},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/DragoniLMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ElsayedLJ21,
  author       = {Mahmoud Said Elsayed and
                  Nhien{-}An Le{-}Khac and
                  Anca Delia Jurcut},
  title        = {Dealing With {COVID-19} Network Traffic Spikes [Cybercrime and Forensics]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {1},
  pages        = {90--94},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3037448},
  doi          = {10.1109/MSEC.2020.3037448},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ElsayedLJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/FarahmandGMN21,
  author       = {Fariborz Farahmand and
                  Jens Grossklags and
                  Jelena Mirkovic and
                  Bill Newhouse},
  title        = {Integrating Cybersecurity and Artificial Intelligence Research in
                  Engineering and Computer Science Education},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {104--110},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3103460},
  doi          = {10.1109/MSEC.2021.3103460},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/FarahmandGMN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Geer21,
  author       = {Daniel E. Geer Jr.},
  title        = {Auto-Update Considered Harmful},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {2},
  pages        = {79--80},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3050248},
  doi          = {10.1109/MSEC.2021.3050248},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Geer21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Geer21a,
  author       = {Daniel E. Geer Jr.},
  title        = {Convergence},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {123--124},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3106594},
  doi          = {10.1109/MSEC.2021.3106594},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Geer21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GenkinY21,
  author       = {Daniel Genkin and
                  Yuval Yarom},
  title        = {Whack-a-Meltdown: Microarchitectural Security Games [Systems Attacks
                  and Defenses]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {1},
  pages        = {95--98},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3036146},
  doi          = {10.1109/MSEC.2020.3036146},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GenkinY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GueyeGBM21,
  author       = {Assane Gueye and
                  Carlos E. C. Galhardo and
                  Irena Bojanova and
                  Peter Mell},
  title        = {A Decade of Reoccurring Software Weaknesses},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {74--82},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3082757},
  doi          = {10.1109/MSEC.2021.3082757},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GueyeGBM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/HaneyLJ21,
  author       = {Julie M. Haney and
                  Wayne G. Lutters and
                  Jody L. Jacobs},
  title        = {Cybersecurity Advocates: Force Multipliers in Security Behavior Change},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {4},
  pages        = {54--59},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3077405},
  doi          = {10.1109/MSEC.2021.3077405},
  timestamp    = {Tue, 21 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/HaneyLJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/HerzbergLSVWZ21,
  author       = {Amir Herzberg and
                  Hemi Leibowitz and
                  Kent E. Seamons and
                  Elham Vaziripour and
                  Justin Wu and
                  Daniel Zappala},
  title        = {Secure Messaging Authentication Ceremonies Are Broken},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {2},
  pages        = {29--37},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3039727},
  doi          = {10.1109/MSEC.2020.3039727},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/HerzbergLSVWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/HussainRK21,
  author       = {Siam U. Hussain and
                  M. Sadegh Riazi and
                  Farinaz Koushanfar},
  title        = {The Fusion of Secure Function Evaluation and Logic Synthesis},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {2},
  pages        = {48--55},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3049062},
  doi          = {10.1109/MSEC.2020.3049062},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/HussainRK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Jaeger21,
  author       = {Trent Jaeger},
  title        = {Toward Fail Safety for Security Decisions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {4--7},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3096614},
  doi          = {10.1109/MSEC.2021.3096614},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Jaeger21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/JereFK21,
  author       = {Malhar Jere and
                  Tyler Farnan and
                  Farinaz Koushanfar},
  title        = {A Taxonomy of Attacks on Federated Learning},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {2},
  pages        = {20--28},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3039941},
  doi          = {10.1109/MSEC.2020.3039941},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/JereFK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KimKKJK21,
  author       = {Dongkwan Kim and
                  Eunsoo Kim and
                  Mingeun Kim and
                  Yeongjin Jang and
                  Yongdae Kim},
  title        = {Enabling the Large-Scale Emulation of Internet of Things Firmware
                  With Heuristic Workarounds},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {26--35},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3076226},
  doi          = {10.1109/MSEC.2021.3076226},
  timestamp    = {Thu, 23 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KimKKJK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KingSTDPV21,
  author       = {Samuel T. King and
                  Nolen Scaife and
                  Patrick Traynor and
                  Zain ul Abi Din and
                  Christian Peeters and
                  Hari Venugopalan},
  title        = {Credit Card Fraud Is a Computer Security Problem},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {2},
  pages        = {65--69},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3050247},
  doi          = {10.1109/MSEC.2021.3050247},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KingSTDPV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LeeCJ21,
  author       = {Yu Tsung Lee and
                  Haining Chen and
                  Trent Jaeger},
  title        = {Demystifying Android's Scoped Storage Defense},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {5},
  pages        = {16--25},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3090564},
  doi          = {10.1109/MSEC.2021.3090564},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LeeCJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LiaoWCHD21,
  author       = {Song Liao and
                  Christin Wilson and
                  Long Cheng and
                  Hongxin Hu and
                  Huixing Deng},
  title        = {Problematic Privacy Policies of Voice Assistant Applications},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {66--73},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3082474},
  doi          = {10.1109/MSEC.2021.3082474},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LiaoWCHD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MassacciJP21,
  author       = {Fabio Massacci and
                  Trent Jaeger and
                  Sean Peisert},
  title        = {SolarWinds and the Challenges of Patching: Can We Ever Stop Dancing
                  With the Devil?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {2},
  pages        = {14--19},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3050433},
  doi          = {10.1109/MSEC.2021.3050433},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MassacciJP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MassacciN21,
  author       = {Fabio Massacci and
                  Chan Nam Ngo},
  title        = {Distributed Financial Exchanges: Security Challenges and Design Principles},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {1},
  pages        = {54--64},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.2994826},
  doi          = {10.1109/MSEC.2020.2994826},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MassacciN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MassacciP21,
  author       = {Fabio Massacci and
                  Ivan Pashchenko},
  title        = {Technical Leverage: Dependencies Are a Mixed Blessing},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {3},
  pages        = {58--62},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3065627},
  doi          = {10.1109/MSEC.2021.3065627},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MassacciP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MenezesS21,
  author       = {Alfred Menezes and
                  Douglas Stebila},
  title        = {Challenges in Cryptography},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {2},
  pages        = {70--73},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3049730},
  doi          = {10.1109/MSEC.2021.3049730},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MenezesS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MenezesS21a,
  author       = {Alfred Menezes and
                  Douglas Stebila},
  title        = {End-to-End Security: When Do We Have It?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {4},
  pages        = {60--64},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3077403},
  doi          = {10.1109/MSEC.2021.3077403},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MenezesS21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MenezesS21b,
  author       = {Alfred Menezes and
                  Douglas Stebila},
  title        = {The Advanced Encryption Standard: 20 Years Later},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {98--102},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3107078},
  doi          = {10.1109/MSEC.2021.3107078},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MenezesS21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Michael21,
  author       = {James Bret Michael},
  title        = {Security and Privacy for Edge Artificial Intelligence},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {4},
  pages        = {4--7},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3078304},
  doi          = {10.1109/MSEC.2021.3078304},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Michael21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MinnaBR0M21,
  author       = {Francesco Minna and
                  Agathe Blaise and
                  Filippo Rebecchi and
                  Balakrishnan Chandrasekaran and
                  Fabio Massacci},
  title        = {Understanding the Security Implications of Kubernetes Networking},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {5},
  pages        = {46--56},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3094726},
  doi          = {10.1109/MSEC.2021.3094726},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MinnaBR0M21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MohammedKF21,
  author       = {Sabah Mohammed and
                  Tai{-}Hoon Kim and
                  Wai{-}Chi Fang},
  title        = {Requirements for Security, Privacy, and Trust in the Internet of Things
                  [Guest Editors' Introduction]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {1},
  pages        = {8--10},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3037624},
  doi          = {10.1109/MSEC.2020.3037624},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MohammedKF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Mussington21,
  author       = {David Mussington},
  title        = {Calculating Risks: Understanding the 2020 Election Experience and
                  Defining the "New Normal"},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {1},
  pages        = {74--80},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3038329},
  doi          = {10.1109/MSEC.2020.3038329},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Mussington21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Nicol21,
  author       = {David M. Nicol},
  title        = {Message from {IEEE} S{\&}P's Outgoing Editor in Chief},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {1},
  pages        = {10},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3037626},
  doi          = {10.1109/MSEC.2020.3037626},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Nicol21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Nicol21a,
  author       = {David M. Nicol},
  title        = {The Ransomware Threat to Energy-Delivery Systems},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {3},
  pages        = {24--32},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3063678},
  doi          = {10.1109/MSEC.2021.3063678},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Nicol21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Okhravi21,
  author       = {Hamed Okhravi},
  title        = {A Cybersecurity Moonshot},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {3},
  pages        = {8--16},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3059438},
  doi          = {10.1109/MSEC.2021.3059438},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Okhravi21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Oorschot21,
  author       = {Paul C. van Oorschot},
  title        = {Toward Unseating the Unsafe {C} Programming Language},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {2},
  pages        = {4--6},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3048766},
  doi          = {10.1109/MSEC.2020.3048766},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Oorschot21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Oorschot21a,
  author       = {Paul C. van Oorschot},
  title        = {Coevolution of Security's Body of Knowledge and Curricula},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {5},
  pages        = {83--89},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3093735},
  doi          = {10.1109/MSEC.2021.3093735},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Oorschot21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ParkCK21,
  author       = {Sangchul Park and
                  Gina J. Choi and
                  Haksoo Ko},
  title        = {Privacy in the Time of {COVID-19:} Divergent Paths for Contact Tracing
                  and Route-Disclosure Mechanisms in South Korea},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {3},
  pages        = {51--56},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3066024},
  doi          = {10.1109/MSEC.2021.3066024},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ParkCK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Peisert21,
  author       = {Sean Peisert},
  title        = {Reflections on the Past, Perspectives on the Future [From the Editors]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {1},
  pages        = {4--7},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3034670},
  doi          = {10.1109/MSEC.2020.3034670},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Peisert21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PeisertSOMBLMMP21,
  author       = {Sean Peisert and
                  Bruce Schneier and
                  Hamed Okhravi and
                  Fabio Massacci and
                  Terry Benzel and
                  Carl E. Landwehr and
                  Mohammad Mannan and
                  Jelena Mirkovic and
                  Atul Prakash and
                  James Bret Michael},
  title        = {Perspectives on the SolarWinds Incident},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {2},
  pages        = {7--13},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3051235},
  doi          = {10.1109/MSEC.2021.3051235},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PeisertSOMBLMMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PolonetskySE21,
  author       = {Jules Polonetsky and
                  Tim Sparapani and
                  Khaled El Emam},
  title        = {A Review of the Privacy-Enhancing Technologies Software Market},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {119--122},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3108295},
  doi          = {10.1109/MSEC.2021.3108295},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PolonetskySE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PujolMGLS21,
  author       = {David Pujol and
                  Ashwin Machanavajjhala},
  title        = {Equity and Privacy: More Than Just a Tradeoff},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {93--97},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3105773},
  doi          = {10.1109/MSEC.2021.3105773},
  timestamp    = {Mon, 27 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PujolMGLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RahmanW21,
  author       = {Akond Rahman and
                  Laurie A. Williams},
  title        = {Different Kind of Smells: Security Smells in Infrastructure as Code
                  Scripts},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {3},
  pages        = {33--41},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3065190},
  doi          = {10.1109/MSEC.2021.3065190},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RahmanW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RamosMS21,
  author       = {Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and
                  Sara Nieves Matheu{-}Garc{\'{\i}}a and
                  Antonio F. Skarmeta},
  title        = {The Challenges of Software Cybersecurity Certification [Building Security
                  In]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {1},
  pages        = {99--102},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3037845},
  doi          = {10.1109/MSEC.2020.3037845},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RamosMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RamosMSANSB21,
  author       = {Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and
                  Juan A. Mart{\'{\i}}nez and
                  Vincenzo Savarino and
                  Marco Angelini and
                  Vincenzo Napolitano and
                  Antonio F. Skarmeta and
                  Gianmarco Baldini},
  title        = {Security and Privacy in Internet of Things-Enabled Smart Cities: Challenges
                  and Future Directions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {1},
  pages        = {12--23},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3012353},
  doi          = {10.1109/MSEC.2020.3012353},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RamosMSANSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RuanXJWSH21,
  author       = {Wenqiang Ruan and
                  Mingxin Xu and
                  Haoyang Jia and
                  Zhenhuan Wu and
                  Lushan Song and
                  Weili Han},
  title        = {Privacy Compliance: Can Technology Come to the Rescue?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {4},
  pages        = {37--43},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3078218},
  doi          = {10.1109/MSEC.2021.3078218},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RuanXJWSH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Sanderson21,
  author       = {Pollyanna Sanderson},
  title        = {Balancing Public Health and Civil Liberties: Privacy Aspects of Contact-Tracing
                  Technologies},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {4},
  pages        = {65--69},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3077785},
  doi          = {10.1109/MSEC.2021.3077785},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Sanderson21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SanzoSW21,
  author       = {Karen L. Sanzo and
                  Jay Paredes Scribner and
                  Hongyi Wu},
  title        = {Designing a {K-16} Cybersecurity Collaborative: {CIPHER}},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {2},
  pages        = {56--59},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3050246},
  doi          = {10.1109/MSEC.2021.3050246},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SanzoSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier21,
  author       = {Bruce Schneier},
  title        = {What Will It Take?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {3},
  pages        = {63--64},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3063800},
  doi          = {10.1109/MSEC.2021.3063800},
  timestamp    = {Thu, 27 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ShiWCS21,
  author       = {Cong Shi and
                  Yan Wang and
                  Yingying (Jennifer) Chen and
                  Nitesh Saxena},
  title        = {Authentication of Voice Commands by Leveraging Vibrations in Wearables},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {83--92},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3077205},
  doi          = {10.1109/MSEC.2021.3077205},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ShiWCS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Simioni21,
  author       = {Marco Simioni},
  title        = {Investigative Techniques for the De-Anonymization of Hidden Services},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {2},
  pages        = {60--64},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3050245},
  doi          = {10.1109/MSEC.2021.3050245},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Simioni21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SkopikWL21,
  author       = {Florian Skopik and
                  Markus Wurzenberger and
                  Max Landauer},
  title        = {The Seven Golden Principles of Effective Anomaly-Based Intrusion Detection},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {5},
  pages        = {36--45},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3090444},
  doi          = {10.1109/MSEC.2021.3090444},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SkopikWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SpringHHMS21,
  author       = {Jonathan M. Spring and
                  Eric Hatleback and
                  Allen D. Householder and
                  Art Manion and
                  Deana Shick},
  title        = {Time to Change the CVSS?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {2},
  pages        = {74--78},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3044475},
  doi          = {10.1109/MSEC.2020.3044475},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SpringHHMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Stalla-Bourdillon21,
  author       = {Sophie Stalla{-}Bourdillon},
  title        = {A Maturity Spectrum for Data Institutions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {5},
  pages        = {90--94},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3094985},
  doi          = {10.1109/MSEC.2021.3094985},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Stalla-Bourdillon21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/StarkDOBEKS21,
  author       = {Emily Stark and
                  Joe DeBlasio and
                  Devon O'Brien and
                  Davide Balzarotti and
                  William Enck and
                  Samuel King and
                  Angelos Stavrou},
  title        = {Certificate Transparency in Google Chrome: Past, Present, and Future},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {112--118},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3103461},
  doi          = {10.1109/MSEC.2021.3103461},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/StarkDOBEKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/TaylorKZ21,
  author       = {Blair Taylor and
                  Sidd Kaza and
                  Paige A. Zaleppa},
  title        = {{CLARK:} {A} Design Science Research Project for Building and Sharing
                  High-Quality Cybersecurity Curricula},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {5},
  pages        = {72--76},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3093136},
  doi          = {10.1109/MSEC.2021.3093136},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/TaylorKZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/TrestianXLCBBJC21,
  author       = {Ramona Trestian and
                  Guodong Xie and
                  Pintu Lohar and
                  Edoardo Celeste and
                  Malika Bendechache and
                  Rob Brennan and
                  Evgeniia Jayasekera and
                  Regina Connolly and
                  Irina Tal},
  title        = {Privacy in a Time of {COVID-19:} How Concerned Are You?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {5},
  pages        = {26--35},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3092607},
  doi          = {10.1109/MSEC.2021.3092607},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/TrestianXLCBBJC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/TumaW21,
  author       = {Katja Tuma and
                  Mathias Widman},
  title        = {Seven Pain Points of Threat Analysis and Risk Assessment in the Automotive
                  Domain},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {5},
  pages        = {78--82},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3093137},
  doi          = {10.1109/MSEC.2021.3093137},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/TumaW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/VaidyaM21,
  author       = {Binod Vaidya and
                  Hussein T. Mouftah},
  title        = {Security for Shared Electric and Automated Mobility Services in Smart
                  Cities},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {1},
  pages        = {24--33},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3013759},
  doi          = {10.1109/MSEC.2020.3013759},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/VaidyaM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Vetillard21,
  author       = {Eric V{\'{e}}tillard},
  title        = {Security Certification: Is It Box Ticking?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {4},
  pages        = {70--74},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3077401},
  doi          = {10.1109/MSEC.2021.3077401},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Vetillard21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/WieflingDI21,
  author       = {Stephan Wiefling and
                  Markus D{\"{u}}rmuth and
                  Luigi Lo Iacono},
  title        = {Verify It's You: How Users Perceive Risk-Based Authentication},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {47--57},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3077954},
  doi          = {10.1109/MSEC.2021.3077954},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/WieflingDI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Williams21,
  author       = {Laurie A. Williams},
  title        = {The People Who Live in Glass Houses Are Happy the Stones Weren't Thrown
                  at Them [From the Editors]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {3},
  pages        = {4--7},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3065723},
  doi          = {10.1109/MSEC.2021.3065723},
  timestamp    = {Thu, 27 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Williams21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/YagemannCURSL21,
  author       = {Carter Yagemann and
                  Simon Pak Ho Chung and
                  Erkam Uzun and
                  Sai Ragam and
                  Brendan Saltaformaggio and
                  Wenke Lee},
  title        = {Modeling Large-Scale Manipulation in Open Stock Markets},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {58--65},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3076717},
  doi          = {10.1109/MSEC.2021.3076717},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/YagemannCURSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/YaoB21,
  author       = {Danfeng Daphne Yao and
                  Terry Benzel},
  title        = {{ACSAC} 2020: Furthering the Quest to Tackle Hard Problems and Find
                  Practical Solutions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {23--24},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3106595},
  doi          = {10.1109/MSEC.2021.3106595},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/YaoB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics