default search action
Search dblp for Publications
export results for "toc:db/journals/ieeesp/ieeesp16.bht:"
@article{DBLP:journals/ieeesp/AhmedR18, author = {Irfan Ahmed and Vassil Roussev}, title = {Peer Instruction Teaching Methodology for Cybersecurity Education}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {4}, pages = {88--91}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3111242}, doi = {10.1109/MSP.2018.3111242}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/AhmedR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/AlbaneseJV18, author = {Massimiliano Albanese and Sushil Jajodia and Sridhar Venkatesan}, title = {Defending from Stealthy Botnets Using Moving Target Defenses}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {1}, pages = {92--97}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1331034}, doi = {10.1109/MSP.2018.1331034}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/AlbaneseJV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/AltmanWV18, author = {Micah Altman and Alexandra Wood and Effy Vayena}, title = {A Harm-Reduction Framework for Algorithmic Fairness}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {3}, pages = {34--45}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.2701149}, doi = {10.1109/MSP.2018.2701149}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/AltmanWV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/AranhaG18, author = {Diego F. Aranha and Jeroen van de Graaf}, title = {The Good, the Bad, and the Ugly: Two Decades of E-Voting in Brazil}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {6}, pages = {22--30}, year = {2018}, url = {https://doi.org/10.1109/MSEC.2018.2875318}, doi = {10.1109/MSEC.2018.2875318}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/AranhaG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/AvgerinosBDGNRW18, author = {Thanassis Avgerinos and David Brumley and John Davis and Ryan Goulden and Tyler Nighswander and Alexandre Rebert and Ned Williamson}, title = {The Mayhem Cyber Reasoning System}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {2}, pages = {52--60}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1870873}, doi = {10.1109/MSP.2018.1870873}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/AvgerinosBDGNRW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BansarkhaniGB18, author = {Rachid El Bansarkhani and Matthias Geihs and Johannes Buchmann}, title = {PQChain: Strategic Design Decisions for Distributed Ledger Technologies against Future Threats}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {4}, pages = {57--65}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3111246}, doi = {10.1109/MSP.2018.3111246}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BansarkhaniGB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BarcellosA18, author = {Marinho P. Barcellos and Diego F. Aranha}, title = {Research in Security and Privacy in Brazil}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {6}, pages = {14--21}, year = {2018}, url = {https://doi.org/10.1109/MSEC.2018.2874855}, doi = {10.1109/MSEC.2018.2874855}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BarcellosA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin18, author = {Steven M. Bellovin}, title = {Toward a National Cybersecurity Policy}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {3}, pages = {108}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.2701148}, doi = {10.1109/MSP.2018.2701148}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BenzelP18, author = {Terry Benzel and Sean Peisert}, title = {Selected Papers from the 2017 {IEEE} Symposium on Security and Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {1}, pages = {10--11}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1331038}, doi = {10.1109/MSP.2018.1331038}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BenzelP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Binns18, author = {Reuben Binns}, title = {What Can Political Philosophy Teach Us about Algorithmic Fairness?}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {3}, pages = {73--80}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.2701147}, doi = {10.1109/MSP.2018.2701147}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Binns18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BlankKS18, author = {Peter Blank and Sabrina Kirrane and Sarah Spiekermann}, title = {Privacy-Aware Restricted Areas for Unmanned Aerial Systems}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {2}, pages = {70--79}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1870868}, doi = {10.1109/MSP.2018.1870868}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BlankKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BryantD18, author = {Timothy Bryant and Shaun Davenport}, title = {A Honeybug for Automated Cyber Reasoning Systems}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {2}, pages = {32--36}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1870856}, doi = {10.1109/MSP.2018.1870856}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BryantD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BuchmannLM18, author = {Johannes Buchmann and Kristin E. Lauter and Michele Mosca}, title = {Postquantum Cryptography, Part 2}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {5}, pages = {12--13}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3761714}, doi = {10.1109/MSP.2018.3761714}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BuchmannLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CeschinPCMOG18, author = {Fabricio Ceschin and Felipe Azevedo Pinage and Marcos A. Castilho and David Menotti and Luiz S. Oliveira and Andre Gregio}, title = {The Need for Speed: An Analysis of Brazilian Malware Classifers}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {6}, pages = {31--41}, year = {2018}, url = {https://doi.org/10.1109/MSEC.2018.2875369}, doi = {10.1109/MSEC.2018.2875369}, timestamp = {Sat, 13 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/CeschinPCMOG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ChenXGLS18, author = {Lin Chen and Lei Xu and Zhimin Gao and Yang Lu and Weidong Shi}, title = {Tyranny of the Majority: On the (Im)possibility of Correctness of Smart Contracts}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {4}, pages = {30--37}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3111240}, doi = {10.1109/MSP.2018.3111240}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ChenXGLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Connolly18, author = {Aisling Connolly}, title = {Freedom of Encryption}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {1}, pages = {102--103}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1331023}, doi = {10.1109/MSP.2018.1331023}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Connolly18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/DunphyP18, author = {Paul Dunphy and Fabien A. P. Petitcolas}, title = {A First Look at Identity Management Schemes on the Blockchain}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {4}, pages = {20--29}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3111247}, doi = {10.1109/MSP.2018.3111247}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/DunphyP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/EdwardsV18, author = {Lilian Edwards and Michael Veale}, title = {Enslaving the Algorithm: From a "Right to an Explanation" to a "Right to Better Decisions"?}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {3}, pages = {46--54}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.2701152}, doi = {10.1109/MSP.2018.2701152}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/EdwardsV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Franz18, author = {Michael Franz}, title = {Making Multivariant Programming Practical and Inexpensive}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {3}, pages = {90--94}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.2701161}, doi = {10.1109/MSP.2018.2701161}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Franz18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer18, author = {Daniel E. Geer Jr.}, title = {Trading Places}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {1}, pages = {104}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1331041}, doi = {10.1109/MSP.2018.1331041}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer18a, author = {Daniel E. Geer Jr.}, title = {You Are What You Eat}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {4}, pages = {96}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3111250}, doi = {10.1109/MSP.2018.3111250}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GiechaskielCR18, author = {Ilias Giechaskiel and Cas Cremers and Kasper Bonne Rasmussen}, title = {When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {4}, pages = {46--56}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3111253}, doi = {10.1109/MSP.2018.3111253}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GiechaskielCR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GoodmanD18, author = {Peter Goodman and Artem Dinaburg}, title = {The Past, Present, and Future of Cyberdyne}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {2}, pages = {61--69}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1870859}, doi = {10.1109/MSP.2018.1870859}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GoodmanD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GuFJCB18, author = {Qinchen Gu and David Formby and Shouling Ji and Hasan Cam and Raheem A. Beyah}, title = {Fingerprinting for Cyber-Physical System Security: Device Physics Matters Too}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {5}, pages = {49--59}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3761722}, doi = {10.1109/MSP.2018.3761722}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/GuFJCB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/HaoCRS18, author = {Feng Hao and Dylan Clarke and Brian Randell and Siamak F. Shahandashti}, title = {Verifiable Classroom Voting in Practice}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {1}, pages = {72--81}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1331032}, doi = {10.1109/MSP.2018.1331032}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/HaoCRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/HenryHK18, author = {Ryan Henry and Amir Herzberg and Aniket Kate}, title = {Blockchain Access Privacy: Challenges and Directions}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {4}, pages = {38--45}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3111245}, doi = {10.1109/MSP.2018.3111245}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/HenryHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/HerleyO18, author = {Cormac Herley and Paul C. van Oorschot}, title = {Science of Security: Combining Theory and Measurement to Reflect the Observable}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {1}, pages = {12--22}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1331028}, doi = {10.1109/MSP.2018.1331028}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/HerleyO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/HofstedePSR18, author = {Rick Hofstede and Aiko Pras and Anna Sperotto and Gabi Dreo Rodosek}, title = {Flow-Based Compromise Detection: Lessons Learned}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {1}, pages = {82--89}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1331021}, doi = {10.1109/MSP.2018.1331021}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/HofstedePSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/JonesKE18, author = {Meg Leta Jones and Ellen Kaufman and Elizabeth Edenberg}, title = {{AI} and the Ethics of Automating Consent}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {3}, pages = {64--72}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.2701155}, doi = {10.1109/MSP.2018.2701155}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/JonesKE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/JordanL18, author = {Stephen P. Jordan and Yi{-}Kai Liu}, title = {Quantum Cryptanalysis: Shor, Grover, and Beyond}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {5}, pages = {14--21}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3761719}, doi = {10.1109/MSP.2018.3761719}, timestamp = {Mon, 30 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/JordanL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KarameC18, author = {Ghassan Karame and Srdjan Capkun}, title = {Blockchain Security and Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {4}, pages = {11--12}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3111241}, doi = {10.1109/MSP.2018.3111241}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/KarameC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KazaTS18, author = {Siddharth Kaza and Blair Taylor and Kyle Sherbert}, title = {Hello, World! - Code Responsibly}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {1}, pages = {98--100}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1331035}, doi = {10.1109/MSP.2018.1331035}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/KazaTS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KharrazRK18, author = {Amin Kharraz and William K. Robertson and Engin Kirda}, title = {Protecting against Ransomware: {A} New Line of Research or Restating Classic Ideas?}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {3}, pages = {103--107}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.2701165}, doi = {10.1109/MSP.2018.2701165}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/KharrazRK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KreutzYVMR18, author = {Diego Kreutz and Jiangshan Yu and Paulo Jorge Esteves Ver{\'{\i}}ssimo and Catia Magalhaes and Fernando M. V. Ramos}, title = {The {KISS} Principle in Software-Defined Networking: {A} Framework for Secure Communications}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {5}, pages = {60--70}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3761717}, doi = {10.1109/MSP.2018.3761717}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/KreutzYVMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Kroll18, author = {Joshua A. Kroll}, title = {Data Science Data Governance {[AI} Ethics]}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {6}, pages = {61--70}, year = {2018}, url = {https://doi.org/10.1109/MSEC.2018.2875329}, doi = {10.1109/MSEC.2018.2875329}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Kroll18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LebeckRKR18, author = {Kiron Lebeck and Kimberly Ruth and Tadayoshi Kohno and Franziska Roesner}, title = {Arya: Operating System Support for Securely Augmenting Reality}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {1}, pages = {44--53}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1331020}, doi = {10.1109/MSP.2018.1331020}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/LebeckRKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LecuyerSGHS18, author = {Mathias L{\'{e}}cuyer and Riley Spahn and Roxana Geambasu and Tzu{-}Kuo Huang and Siddhartha Sen}, title = {Enhancing Selectivity in Big Data}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {1}, pages = {34--42}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1331036}, doi = {10.1109/MSP.2018.1331036}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/LecuyerSGHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LiuLKA18, author = {Jian Liu and Wenting Li and Ghassan O. Karame and N. Asokan}, title = {Toward Fairness of Cryptocurrency Payments}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {3}, pages = {81--89}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.2701163}, doi = {10.1109/MSP.2018.2701163}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/LiuLKA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MatiasBCCA18, author = {Paulo Matias and Pedro Barbosa and Thiago N. C. Cardoso and Diego M. Campos and Diego F. Aranha}, title = {{NIZKCTF:} {A} Noninteractive Zero-Knowledge Capture-the-Flag Platform}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {6}, pages = {42--51}, year = {2018}, url = {https://doi.org/10.1109/MSEC.2018.2875324}, doi = {10.1109/MSEC.2018.2875324}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/MatiasBCCA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McGraw18, author = {Gary McGraw}, title = {Silver Bullet Talks with Wafaa Mamilli}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {1}, pages = {6--9}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1331039}, doi = {10.1109/MSP.2018.1331039}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/McGraw18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McGraw18a, author = {Gary McGraw}, title = {Silver Bullet Talks with Craig Froelich}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {2}, pages = {6--8}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1870860}, doi = {10.1109/MSP.2018.1870860}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/McGraw18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McGraw18b, author = {Gary McGraw}, title = {Silver Bullet Talks with Bruce Potter}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {3}, pages = {12--14}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.2701167}, doi = {10.1109/MSP.2018.2701167}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/McGraw18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McGraw18c, author = {Gary McGraw}, title = {Silver Bullet Talks with Nick Weaver}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {4}, pages = {7--10}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3111252}, doi = {10.1109/MSP.2018.3111252}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/McGraw18c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McGraw18d, author = {Gary McGraw}, title = {Silver Bullet Talks with Tanya Janca}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {5}, pages = {7--11}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3761705}, doi = {10.1109/MSP.2018.3761705}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/McGraw18d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McGraw18e, author = {Gary McGraw}, title = {Silver Bullet Talks With Kathleen Fisher [Interview]}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {6}, pages = {4--9}, year = {2018}, url = {https://doi.org/10.1109/MSEC.2018.2882152}, doi = {10.1109/MSEC.2018.2882152}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/McGraw18e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McLeanHO18, author = {John D. McLean and Cormac Herley and Paul C. van Oorschot}, title = {Letter to the Editor}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {3}, pages = {6--10}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.2701158}, doi = {10.1109/MSP.2018.2701158}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/McLeanHO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Meiklejohn18, author = {Sarah Meiklejohn}, title = {Top Ten Obstacles along Distributed Ledgers Path to Adoption}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {4}, pages = {13--19}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3111235}, doi = {10.1109/MSP.2018.3111235}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Meiklejohn18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Mosca18, author = {Michele Mosca}, title = {Cybersecurity in an Era with Quantum Computers: Will We Be Ready?}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {5}, pages = {38--41}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3761723}, doi = {10.1109/MSP.2018.3761723}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Mosca18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Nguyen-TuongMDC18, author = {Anh Nguyen{-}Tuong and David Melski and Jack W. Davidson and Michele Co and William H. Hawkins and Jason D. Hiser and Derek Morris and Ducson Nguyen and Eric F. Rizzi}, title = {Xandra: An Autonomous Cyber Battle System for the Cyber Grand Challenge}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {2}, pages = {42--51}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1870876}, doi = {10.1109/MSP.2018.1870876}, timestamp = {Sat, 11 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Nguyen-TuongMDC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/OliveiraEKR18, author = {Daniela Seabra Oliveira and Jeremy Epstein and James F. Kurose and Anderson Rocha}, title = {Cybersecurity and Privacy Issues in Brazil: Back, Now, and Then [Guest Editors' Introduction]}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {6}, pages = {10--12}, year = {2018}, url = {https://doi.org/10.1109/MSEC.2018.2874824}, doi = {10.1109/MSEC.2018.2874824}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/OliveiraEKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PearceELFP18, author = {Paul Pearce and Roya Ensafi and Frank Li and Nick Feamster and Vern Paxson}, title = {Toward Continual Measurement of Global Network-Level Censorship}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {1}, pages = {24--33}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1331018}, doi = {10.1109/MSP.2018.1331018}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/PearceELFP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PerrottaH18, author = {Raffaello Perrotta and Feng Hao}, title = {Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {4}, pages = {66--81}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3111249}, doi = {10.1109/MSP.2018.3111249}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/PerrottaH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PriceZTE18, author = {Benjamin Price and Michael Zhivich and Michael Thompson and Chris Eagle}, title = {House Rules: Designing the Scoring Algorithm for Cyber Grand Challenge}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {2}, pages = {23--31}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1870877}, doi = {10.1109/MSP.2018.1870877}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/PriceZTE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RashidDCLMLP18, author = {Awais Rashid and George Danezis and Howard Chivers and Emil Lupu and Andrew Martin and Makayla Lewis and Claudia Peersman}, title = {Scoping the Cyber Security Body of Knowledge}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {3}, pages = {96--102}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.2701150}, doi = {10.1109/MSP.2018.2701150}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/RashidDCLMLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RoettelerS18, author = {Martin Roetteler and Krysta M. Svore}, title = {Quantum Computing: Codebreaking and Beyond}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {5}, pages = {22--36}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3761710}, doi = {10.1109/MSP.2018.3761710}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/RoettelerS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RonenSWO18, author = {Eyal Ronen and Adi Shamir and Achi{-}Or Weingarten and Colin O'Flynn}, title = {IoT Goes Nuclear: Creating a Zigbee Chain Reaction}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {1}, pages = {54--62}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1331033}, doi = {10.1109/MSP.2018.1331033}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/RonenSWO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Sasaki18, author = {Masahide Sasaki}, title = {Quantum Key Distribution and Its Applications}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {5}, pages = {42--48}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3761713}, doi = {10.1109/MSP.2018.3761713}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Sasaki18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Schneier18, author = {Bruce Schneier}, title = {Artificial Intelligence and the Attack/Defense Balance}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {2}, pages = {96}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1870857}, doi = {10.1109/MSP.2018.1870857}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Schneier18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Schneier18a, author = {Bruce Schneier}, title = {Cryptography after the Aliens Land}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {5}, pages = {86--88}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3761724}, doi = {10.1109/MSP.2018.3761724}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Schneier18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Schneier18b, author = {Bruce Schneier}, title = {Unnoticed Consent [Last Word]}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {6}, pages = {80--79}, year = {2018}, url = {https://doi.org/10.1109/MSEC.2018.2882121}, doi = {10.1109/MSEC.2018.2882121}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Schneier18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SchraderG18, author = {Dawn E. Schrader and Dipayan P. Ghosh}, title = {Proactively Protecting Against the Singularity: Ethical Decision Making in {AI}}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {3}, pages = {56--63}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.2701169}, doi = {10.1109/MSP.2018.2701169}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/SchraderG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Shoshitaishvili18, author = {Yan Shoshitaishvili and Antonio Bianchi and Kevin Borgolte and Amat Cama and Jacopo Corbetta and Francesco Disperati and Andrew Dutcher and John Grosen and Paul Grosen and Aravind Machiry and Christopher Salls and Nick Stephens and Ruoyu Wang and Giovanni Vigna}, title = {Mechanical Phish: Resilient Autonomous Hacking}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {2}, pages = {12--22}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1870858}, doi = {10.1109/MSP.2018.1870858}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Shoshitaishvili18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SilvaBAMVSM18, author = {Paulo Silva and T{\^{a}}nia Basso and Nuno Antunes and Regina Moraes and Marco Vieira and Paulo Sim{\~{o}}es and Edmundo Monteiro}, title = {A Europe-Brazil Context for Secure Data Analytics in the Cloud}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {6}, pages = {52--60}, year = {2018}, url = {https://doi.org/10.1109/MSEC.2018.2875326}, doi = {10.1109/MSEC.2018.2875326}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/SilvaBAMVSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SloanW18, author = {Robert H. Sloan and Richard Warner}, title = {When Is an Algorithm Transparent? Predictive Analytics, Privacy, and Public Policy}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {3}, pages = {18--25}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.2701166}, doi = {10.1109/MSP.2018.2701166}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/SloanW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/StahlW18, author = {Bernd Carsten Stahl and David Wright}, title = {Ethics and Privacy in {AI} and Big Data: Implementing Responsible Research and Innovation}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {3}, pages = {26--33}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.2701164}, doi = {10.1109/MSP.2018.2701164}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/StahlW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/StobertCMS18, author = {Elizabeth Stobert and Elizabeta Cavar and Luka Malisa and David M. Sommer}, title = {Teaching Authentication as a Life Skill}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {5}, pages = {82--85}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3761712}, doi = {10.1109/MSP.2018.3761712}, timestamp = {Thu, 27 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/StobertCMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SunLS18, author = {Xiaoyan Sun and Peng Liu and Anoop Singhal}, title = {Toward Cyberresiliency in the Context of Cloud Computing [Resilient Security]}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {6}, pages = {71--75}, year = {2018}, url = {https://doi.org/10.1109/MSEC.2018.2882122}, doi = {10.1109/MSEC.2018.2882122}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/SunLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TenePS18, author = {Omer Tene and Jules Polonetsky and Ahmad{-}Reza Sadeghi}, title = {Five Freedoms for the Homo Deus}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {3}, pages = {15--17}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.2701156}, doi = {10.1109/MSP.2018.2701156}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/TenePS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Thompson18, author = {Michael F. Thompson}, title = {Effects of a Honeypot on the Cyber Grand Challenge Final Event}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {2}, pages = {37--41}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1870870}, doi = {10.1109/MSP.2018.1870870}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Thompson18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ThompsonI18, author = {Michael F. Thompson and Cynthia E. Irvine}, title = {Individualizing Cybersecurity Lab Exercises with Labtainers}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {2}, pages = {91--95}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1870862}, doi = {10.1109/MSP.2018.1870862}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ThompsonI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Tziakouris18, author = {Giannis Tziakouris}, title = {Cryptocurrencies - {A} Forensic Challenge or Opportunity for Law Enforcement? An {INTERPOL} Perspective}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {4}, pages = {92--94}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3111243}, doi = {10.1109/MSP.2018.3111243}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Tziakouris18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/VidasLOS18, author = {Timothy Vidas and Per Larsen and Hamed Okhravi and Ahmad{-}Reza Sadeghi}, title = {Changing the Game of Software Security}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {2}, pages = {10--11}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1870863}, doi = {10.1109/MSP.2018.1870863}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/VidasLOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Wang18, author = {Yang Wang}, title = {Inclusive Security and Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {4}, pages = {82--87}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3111237}, doi = {10.1109/MSP.2018.3111237}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Wang18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/WangL18, author = {Cliff Wang and Zhuo Lu}, title = {Cyber Deception: Overview and the Road Ahead}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {2}, pages = {80--85}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1870866}, doi = {10.1109/MSP.2018.1870866}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/WangL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/WijesekeraBTREW18, author = {Primal Wijesekera and Arjun Baokar and Lynn Tsai and Joel Reardon and Serge Egelman and David A. Wagner and Konstantin Beznosov}, title = {Dynamically Regulating Mobile Application Permissions}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {1}, pages = {64--71}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1331031}, doi = {10.1109/MSP.2018.1331031}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/WijesekeraBTREW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/WinklerZE18, author = {Stephanie Winkler and Sherali Zeadally and Katrine Evans}, title = {Privacy and Civilian Drone Use: The Need for Further Regulation}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {5}, pages = {72--80}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3761721}, doi = {10.1109/MSP.2018.3761721}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/WinklerZE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Wisniewski18, author = {Pamela J. Wisniewski}, title = {The Privacy Paradox of Adolescent Online Safety: {A} Matter of Risk Prevention or Risk Resilience?}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {2}, pages = {86--90}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1870874}, doi = {10.1109/MSP.2018.1870874}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Wisniewski18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.