Stop the war!
Остановите войну!
for scientists:
default search action
IEEE Security & Privacy, Volume 17
Volume 17, Number 1, January - February 2019
- Phyllis A. Schneck:
Cybersecurity Compliance Is Necessary but Not Sufficient: Bad Guys Don't Follow Laws. 4-6 - Wojciech Mazurczyk, Luca Caviglione, Steffen Wendzel:
Recent Advancements in Digital Forensics, Part 2. 7-8 - Hui Tian, Yuxiang Chen, Hong Jiang, Yongfeng Huang, Fulin Nan, Yonghong Chen:
Public Auditing for Trusted Cloud Storage Services. 10-22 - Apostolos Axenopoulos, Volker Eiselein, Antonio Penta, Eugenia Koblents, Ernesto La Mattina, Petros Daras:
A Framework for Large-Scale Analysis of Video "in the Wild" to Assist Digital Forensic Examination. 23-33 - Joseph Ricci, Ibrahim M. Baggili, Frank Breitinger:
Blockchain-Based Distributed Cloud Storage Digital Forensics: Where's the Beef? 34-42 - Rodrigo Carvalho, Michael Goldsmith, Sadie Creese:
Investigating Malware Campaigns With Semantic Technologies. 43-54 - Sherenaz W. Al-Haj Baddar, Alessio Merlo, Mauro Migliardi:
Behavioral-Anomaly Detection in Forensics Analysis. 55-62 - Davide Maiorca, Battista Biggio:
Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware. 63-71 - Alan T. Sherman, Farid Javani, Haibin Zhang, Enis Golaszewski:
On the Origins and Variations of Blockchain Technologies. 72-77 - Mathias Payer:
The Fuzzing Hype-Train: How Random Testing Triggers Thousands of Crashes. 78-82 - Bruce Schneier:
Cybersecurity for the Public Interest. 84-83
Volume 17, Number 2, March - April 2019
- Sean Peisert:
Some Experiences in Developing Security Technology That Actually Get Used. 4-7 - Dimitris M. Kyriazanos, Konstantinos Giorgos Thanos, Stelios C. A. Thomopoulos:
Automated Decision Making in Airport Checkpoints: Bias Detection Toward Smarter Security and Fairness. 8-16 - Martin Abrams, John Abrams, Peter Cullen, Lynn Goldstein:
Artificial Intelligence, Ethics, and Enhanced Data Stewardship. 17-30 - Bita Darvish Rouhani, Mohammad Samragh, Tara Javidi, Farinaz Koushanfar:
Safe Machine Learning and Defeating Adversarial Attacks. 31-38 - Mohammad S. Jalali, Jessica P. Kaiser, Michael D. Siegel, Stuart E. Madnick:
The Internet of Things Promises New Benefits and Risks: A Systematic Analysis of Adoption Dynamics of IoT Products. 39-48 - Mohammad Al-Rubaie, J. Morris Chang:
Privacy-Preserving Machine Learning: Threats and Solutions. 49-58 - Graeme Horsman:
A Call for the Prohibition of Encryption: Panacea or Problem? 59-66 - Yixin Zou, Florian Schaub:
Beyond Mandatory: Making Data Breach Notifications Useful for Consumers. 67-72 - Vincent Nestler, Tony Coulson, James D. Ashley III:
The NICE Challenge Project: Providing Workforce Experience Before the Workforce. 73-78 - Daniel E. Geer Jr.:
Unknowable Unknowns. 80-79
Volume 17, Number 3, May - June 2019
- Paul C. van Oorschot:
Software Security and Systematizing Knowledge. 4-6 - Susanne Barth, Pieter H. Hartel, Marianne Junger, Lorena Montoya:
Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of \"Thinking Like a Thief\". 8-16 - Kalman C. Toth, Alan Anderson-Priddy:
Self-Sovereign Digital Identity: A Paradigm Shift for Identity. 17-27 - Dirk van der Linden, Anna Zamansky, Irit Hadar, Barnaby Craggs, Awais Rashid:
Buddy's Wearable Is Not Your Buddy: Privacy Implications of Pet Wearables. 28-39 - Joshua Siegel, Sanjay E. Sarma:
A Cognitive Protection System for the Internet of Things. 40-48 - Joshua Eric Siegel, Sanjay E. Sarma:
Using Open Channels to Trigger the Invited, Unintended Consequences of the Internet of Things. 49-55 - Ankush Singla, Elisa Bertino:
How Deep Learning Is Making Information Security More Intelligent. 56-65 - Sara Nieves Matheu-García, José Luis Hernández Ramos, Antonio F. Skarmeta:
Toward a Cybersecurity Certification Framework for the Internet of Things. 66-76 - Andelka M. Phillips:
Buying Your Genetic Self Online: Pitfalls and Potential Reforms in DNA Testing. 77-81 - Alan T. Sherman, Peter A. H. Peterson, Enis Golaszewski, Edward LaFemina, Ethan Goldschen, Mohammed Khan, Lauren Mundy, Mykah Rather, Bryan Solis, Wubnyonga Tete, Edwin Valdez, Brian Weber, Damian Doyle, Casey O'Brien, Linda Oliva, Joseph Roundy, Jack Suess:
Project-Based Learning Inspires Cybersecurity Students: A Scholarship-for-Service Research Study. 82-88 - Ron Herardian:
The Soft Underbelly of Cloud Security. 90-93 - Steven M. Bellovin:
Layered Insecurity. 96-95
Volume 17, Number 4, July - August 2019
- William Enck, Terry Benzel:
Selected Papers From the 2018 USENIX Security Symposium. 7-8 - Nolen Scaife, Christian Peeters, Patrick Traynor:
More Cowbell: Lessons Learned in Developing the Skim Reaper. 10-17 - Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, Michael D. Bailey:
Emerging Threats in Internet of Things Voice Services. 18-24 - Gertjan Franken, Tom van Goethem, Wouter Joosen:
Exposing Cookie Policy Flaws Through an Extensive Evaluation of Browsers and Their Extensions. 25-34 - Rock Stevens, Daniel Votipka, Elissa M. Redmiles, Colin Ahern, Michelle L. Mazurek:
Applied Digital Threat Modeling: It Works. 35-42 - Moritz Schneider, Sinisa Matetic, Ari Juels, Andrew Miller, Srdjan Capkun:
Secure Brokered Delegation Through DelegaTEE. 43-52 - Lorenz Breidenbach, Philip Daian, Florian Tramèr, Ari Juels:
The Hydra Framework for Principled, Automated Bug Bounties. 53-61 - Chris Culnane, Aleksander Essex, Sarah Jamie Lewis, Olivier Pereira, Vanessa Teague:
Knights and Knaves Run Elections: Internet Voting and Undetectable Electoral Fraud. 62-70 - Nithya Sambasivan, Nova Ahmed, Amna Batool, Elie Bursztein, Elizabeth F. Churchill, Laura Sanely Gaytán-Lugo, Tara Matthews, David Nemer, Kurt Thomas, Sunny Consolvo:
Toward Gender-Equitable Privacy and Security in South Asia. 71-77 - Erwan Beguin, Solal Besnard, Adrien Cros, Barbara Joannes, Ombeline Leclerc-Istria, Alexa Noel, Nicolas Roels, Faical Taleb, Jean Thongphan, Eric Alata, Vincent Nicomette:
Computer-Security-Oriented Escape Room. 78-83 - Pavel Gladyshev:
Cybercrime as a Consequence of Unreasonable Expectations. 84-87 - Adam Bates, Wajih Ul Hassan:
Can Data Provenance Put an End to the Data Breach? 88-93 - Nadim Kobeissi:
Selfie?s Reflections on Formal Verification for Transport Layer Security 1.3: Largely Opaque. 94-96 - Jeremy Epstein:
A Horse's Rump and Cybersecurity. 4-6 - Daniel E. Geer Jr.:
Ownership. 100-99
Volume 17, Number 5, September - October 2019
- Laurie A. Williams:
Science Leaves Clues. 4-6 - Paul C. van Oorschot, Sean W. Smith:
The Internet of Things: Security Challenges. 7-9 - Junia Valente, Matthew Wynn, Alvaro A. Cárdenas:
Stealing, Spying, and Abusing: Consequences of Attacks on Internet of Things Devices. 10-21 - Musard Balliu, Iulia Bastys, Andrei Sabelfeld:
Securing IoT Apps. 22-29 - Z. Berkay Celik, Patrick D. McDaniel, Gang Tan, Leonardo Babun, A. Selcuk Uluagac:
Verifying Internet of Things Safety and Security in Physical Spaces. 30-37 - Grant Hernandez, Farhaan Fowze, Dave Jing Tian, Tuba Yavuz, Patrick Traynor, Kevin R. B. Butler:
Toward Automated Firmware Analysis in the IoT Era. 38-46 - Hannes Tschofenig, Emmanuel Baccelli:
Cyberphysical Security for the Masses: A Survey of the Internet Protocol Suite for Internet of Things Security. 47-57 - Roee Leon, Michael Kiperberg, Anat Anatey Leon Zabag, Amit Resh, Asaf Algawi, Nezer J. Zaidenberg:
Hypervisor-Based White Listing of Executables. 58-67 - Markus Jakobsson:
The Rising Threat of Launchpad Attacks. 68-72 - Stephan Raaijmakers:
Artificial Intelligence for Law Enforcement: Challenges and Opportunities. 74-77 - Igor Linkov, Fabrizio Baiardi, Marie-Valentine Florin, Scott Greer, James H. Lambert, Miriam Pollock, Jean-Marc Rickli, Lada Roslycky, Thomas P. Seager, Heimir Thorisson, Benjamin D. Trump:
Applying Resilience to Hybrid Threats. 78-83 - Luk Arbuckle, Felix Ritchie:
The Five Safes of Risk-Based Anonymization. 84-89 - Fabio Massacci:
Is "Deny Access" a Valid "Fail-Safe Default" Principle for Building Security in Cyberphysical Systems? 90-93 - Elisa Bertino:
It Takes a Village to Secure Cellular Networks. 96-95
Volume 17, Number 6, November - December 2019
- James Bret Michael:
Trustworthiness of Autonomous Machines in Armed Conflict. 4-6 - Omer Tene, Katrine Evans, Bruno Gencarelli, Gabe Maldoff, Gabriela Zanfir-Fortuna:
GDPR at Year One: Enter the Designers and Engineers. 7-9 - Nurul Momen, Majid Hatamian, Lothar Fritsch:
Did App Privacy Improve After the GDPR? 10-20 - Jatinder Singh, Jennifer Cobbe:
The Security Implications of Data Subject Rights. 21-30 - Ronald Petrlic:
The General Data Protection Regulation: From a Data Protection Authority's (Technical) Perspective. 31-36 - Cesare Bartolini, Gabriele Lenzini, Livio Robaldo:
The DAta Protection REgulation COmpliance Model. 37-45 - Bülent Yener, Tsvi Gal:
Cybersecurity in the Era of Data Science: Examining New Adversarial Models. 46-53 - M. Sadegh Riazi, Bita Darvish Rouhani, Farinaz Koushanfar:
Deep Learning on Private Data. 54-63 - Dan Boneh, Andrew J. Grotto, Patrick D. McDaniel, Nicolas Papernot:
How Relevant Is the Turing Test in the Age of Sophisbots? 64-71 - Scott Ruoti, Kent E. Seamons:
Johnny's Journey Toward Usable Secure Email. 72-76 - Alan T. Sherman, Josiah Dykstra, Gregory V. Bard, Ankur Chattopadhyay, Filipo Sharevski, Rakesh M. Verma, Ryan Vrecenar, Linda Oliva, Enis Golaszewski, Dhananjay S. Phatak, Travis Scheponik, Geoffrey L. Herman, Dong San Choi, Spencer E. Offenberger, Peter Peterson:
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories. 77-83 - Andrew Fasano, Tim Leek, Brendan Dolan-Gavitt, Josh Bundt:
The Rode0day to Less-Buggy Programs. 84-88 - Daniel E. Geer Jr., Dale Peterson:
Failure as Design. 89-90
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.