Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ieeesp/ieeesp17.bht:"
@article{DBLP:journals/ieeesp/AbramsACG19, author = {Martin Abrams and John Abrams and Peter Cullen and Lynn Goldstein}, title = {Artificial Intelligence, Ethics, and Enhanced Data Stewardship}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {2}, pages = {17--30}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2018.2888778}, doi = {10.1109/MSEC.2018.2888778}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/AbramsACG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Al-RubaieC19, author = {Mohammad Al{-}Rubaie and J. Morris Chang}, title = {Privacy-Preserving Machine Learning: Threats and Solutions}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {2}, pages = {49--58}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2018.2888775}, doi = {10.1109/MSEC.2018.2888775}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Al-RubaieC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ArbuckleR19, author = {Luk Arbuckle and Felix Ritchie}, title = {The Five Safes of Risk-Based Anonymization}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {5}, pages = {84--89}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2929282}, doi = {10.1109/MSEC.2019.2929282}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ArbuckleR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/AxenopoulosEPKM19, author = {Apostolos Axenopoulos and Volker Eiselein and Antonio Penta and Eugenia Koblents and Ernesto La Mattina and Petros Daras}, title = {A Framework for Large-Scale Analysis of Video "in the Wild" to Assist Digital Forensic Examination}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {1}, pages = {23--33}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2018.2875851}, doi = {10.1109/MSEC.2018.2875851}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/AxenopoulosEPKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BaddarMM19, author = {Sherenaz W. Al{-}Haj Baddar and Alessio Merlo and Mauro Migliardi}, title = {Behavioral-Anomaly Detection in Forensics Analysis}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {1}, pages = {55--62}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2894917}, doi = {10.1109/MSEC.2019.2894917}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BaddarMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BalliuBS19, author = {Musard Balliu and Iulia Bastys and Andrei Sabelfeld}, title = {Securing IoT Apps}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {5}, pages = {22--29}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2914190}, doi = {10.1109/MSEC.2019.2914190}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BalliuBS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BarthHJM19, author = {Susanne Barth and Pieter H. Hartel and Marianne Junger and Lorena Montoya}, title = {Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of {\textbackslash}"Thinking Like a Thief{\textbackslash}"}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {3}, pages = {8--16}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2018.2888781}, doi = {10.1109/MSEC.2018.2888781}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BarthHJM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BartoliniLR19, author = {Cesare Bartolini and Gabriele Lenzini and Livio Robaldo}, title = {The DAta Protection REgulation COmpliance Model}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {6}, pages = {37--45}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2937756}, doi = {10.1109/MSEC.2019.2937756}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BartoliniLR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BatesH19, author = {Adam Bates and Wajih Ul Hassan}, title = {Can Data Provenance Put an End to the Data Breach?}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {4}, pages = {88--93}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2913693}, doi = {10.1109/MSEC.2019.2913693}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BatesH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BeguinBCJLNRTTA19, author = {Erwan Beguin and Solal Besnard and Adrien Cros and Barbara Joannes and Ombeline Leclerc{-}Istria and Alexa Noel and Nicolas Roels and Faical Taleb and Jean Thongphan and Eric Alata and Vincent Nicomette}, title = {Computer-Security-Oriented Escape Room}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {4}, pages = {78--83}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2912700}, doi = {10.1109/MSEC.2019.2912700}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BeguinBCJLNRTTA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin19, author = {Steven M. Bellovin}, title = {Layered Insecurity}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {3}, pages = {96--95}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2906807}, doi = {10.1109/MSEC.2019.2906807}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bertino19, author = {Elisa Bertino}, title = {It Takes a Village to Secure Cellular Networks}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {5}, pages = {96--95}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2922867}, doi = {10.1109/MSEC.2019.2922867}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bertino19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BonehGMP19, author = {Dan Boneh and Andrew J. Grotto and Patrick D. McDaniel and Nicolas Papernot}, title = {How Relevant Is the Turing Test in the Age of Sophisbots?}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {6}, pages = {64--71}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2934193}, doi = {10.1109/MSEC.2019.2934193}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BonehGMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BreidenbachDTJ19, author = {Lorenz Breidenbach and Philip Daian and Florian Tram{\`{e}}r and Ari Juels}, title = {The Hydra Framework for Principled, Automated Bug Bounties}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {4}, pages = {53--61}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2914109}, doi = {10.1109/MSEC.2019.2914109}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BreidenbachDTJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CarvalhoGC19, author = {Rodrigo Carvalho and Michael Goldsmith and Sadie Creese}, title = {Investigating Malware Campaigns With Semantic Technologies}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {1}, pages = {43--54}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2018.2875878}, doi = {10.1109/MSEC.2018.2875878}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/CarvalhoGC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CelikMTBU19, author = {Z. Berkay Celik and Patrick D. McDaniel and Gang Tan and Leonardo Babun and A. Selcuk Uluagac}, title = {Verifying Internet of Things Safety and Security in Physical Spaces}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {5}, pages = {30--37}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2911511}, doi = {10.1109/MSEC.2019.2911511}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/CelikMTBU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CulnaneELPT19, author = {Chris Culnane and Aleksander Essex and Sarah Jamie Lewis and Olivier Pereira and Vanessa Teague}, title = {Knights and Knaves Run Elections: Internet Voting and Undetectable Electoral Fraud}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {4}, pages = {62--70}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2915398}, doi = {10.1109/MSEC.2019.2915398}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/CulnaneELPT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/EnckB19, author = {William Enck and Terry Benzel}, title = {Selected Papers From the 2018 {USENIX} Security Symposium}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {4}, pages = {7--8}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2915397}, doi = {10.1109/MSEC.2019.2915397}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/EnckB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Epstein19, author = {Jeremy Epstein}, title = {A Horse's Rump and Cybersecurity}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {4}, pages = {4--6}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2916238}, doi = {10.1109/MSEC.2019.2916238}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Epstein19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/FasanoLDB19, author = {Andrew Fasano and Tim Leek and Brendan Dolan{-}Gavitt and Josh Bundt}, title = {The Rode0day to Less-Buggy Programs}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {6}, pages = {84--88}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2933682}, doi = {10.1109/MSEC.2019.2933682}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/FasanoLDB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/FrankenGJ19, author = {Gertjan Franken and Tom van Goethem and Wouter Joosen}, title = {Exposing Cookie Policy Flaws Through an Extensive Evaluation of Browsers and Their Extensions}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {4}, pages = {25--34}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2909710}, doi = {10.1109/MSEC.2019.2909710}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/FrankenGJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer19, author = {Daniel E. Geer Jr.}, title = {Unknowable Unknowns}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {2}, pages = {80--79}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2898636}, doi = {10.1109/MSEC.2019.2898636}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer19a, author = {Daniel E. Geer Jr.}, title = {Ownership}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {4}, pages = {100--99}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2914845}, doi = {10.1109/MSEC.2019.2914845}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerP19, author = {Daniel E. Geer Jr. and Dale Peterson}, title = {Failure as Design}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {6}, pages = {89--90}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2936706}, doi = {10.1109/MSEC.2019.2936706}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Gladyshev19, author = {Pavel Gladyshev}, title = {Cybercrime as a Consequence of Unreasonable Expectations}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {4}, pages = {84--87}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2913772}, doi = {10.1109/MSEC.2019.2913772}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Gladyshev19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Herardian19, author = {Ron Herardian}, title = {The Soft Underbelly of Cloud Security}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {3}, pages = {90--93}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2904112}, doi = {10.1109/MSEC.2019.2904112}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Herardian19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/HernandezFTYTB19, author = {Grant Hernandez and Farhaan Fowze and Dave Jing Tian and Tuba Yavuz and Patrick Traynor and Kevin R. B. Butler}, title = {Toward Automated Firmware Analysis in the IoT Era}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {5}, pages = {38--46}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2926462}, doi = {10.1109/MSEC.2019.2926462}, timestamp = {Sat, 11 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/HernandezFTYTB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Horsman19, author = {Graeme Horsman}, title = {A Call for the Prohibition of Encryption: Panacea or Problem?}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {2}, pages = {59--66}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2018.2888776}, doi = {10.1109/MSEC.2018.2888776}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Horsman19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Jakobsson19, author = {Markus Jakobsson}, title = {The Rising Threat of Launchpad Attacks}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {5}, pages = {68--72}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2922865}, doi = {10.1109/MSEC.2019.2922865}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Jakobsson19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/JalaliKSM19, author = {Mohammad S. Jalali and Jessica P. Kaiser and Michael D. Siegel and Stuart E. Madnick}, title = {The Internet of Things Promises New Benefits and Risks: {A} Systematic Analysis of Adoption Dynamics of IoT Products}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {2}, pages = {39--48}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2018.2888780}, doi = {10.1109/MSEC.2018.2888780}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/JalaliKSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Kobeissi19, author = {Nadim Kobeissi}, title = {Selfie?s Reflections on Formal Verification for Transport Layer Security 1.3: Largely Opaque}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {4}, pages = {94--96}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2913027}, doi = {10.1109/MSEC.2019.2913027}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Kobeissi19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KumarPMHMBB19, author = {Deepak Kumar and Riccardo Paccagnella and Paul Murley and Eric Hennenfent and Joshua Mason and Adam Bates and Michael D. Bailey}, title = {Emerging Threats in Internet of Things Voice Services}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {4}, pages = {18--24}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2910013}, doi = {10.1109/MSEC.2019.2910013}, timestamp = {Mon, 20 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/KumarPMHMBB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KyriazanosTT19, author = {Dimitris M. Kyriazanos and Konstantinos Giorgos Thanos and Stelios C. A. Thomopoulos}, title = {Automated Decision Making in Airport Checkpoints: Bias Detection Toward Smarter Security and Fairness}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {2}, pages = {8--16}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2018.2888777}, doi = {10.1109/MSEC.2018.2888777}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/KyriazanosTT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LeonKZRAZ19, author = {Roee Leon and Michael Kiperberg and Anat Anatey Leon Zabag and Amit Resh and Asaf Algawi and Nezer J. Zaidenberg}, title = {Hypervisor-Based White Listing of Executables}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {5}, pages = {58--67}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2910218}, doi = {10.1109/MSEC.2019.2910218}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/LeonKZRAZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LindenZHCR19, author = {Dirk van der Linden and Anna Zamansky and Irit Hadar and Barnaby Craggs and Awais Rashid}, title = {Buddy's Wearable Is Not Your Buddy: Privacy Implications of Pet Wearables}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {3}, pages = {28--39}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2018.2888783}, doi = {10.1109/MSEC.2018.2888783}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/LindenZHCR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LinkovBFGLPRRST19, author = {Igor Linkov and Fabrizio Baiardi and Marie{-}Valentine Florin and Scott Greer and James H. Lambert and Miriam Pollock and Jean{-}Marc Rickli and Lada Roslycky and Thomas P. Seager and Heimir Thorisson and Benjamin D. Trump}, title = {Applying Resilience to Hybrid Threats}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {5}, pages = {78--83}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2922866}, doi = {10.1109/MSEC.2019.2922866}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/LinkovBFGLPRRST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MaiorcaB19, author = {Davide Maiorca and Battista Biggio}, title = {Digital Investigation of {PDF} Files: Unveiling Traces of Embedded Malware}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {1}, pages = {63--71}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2018.2875879}, doi = {10.1109/MSEC.2018.2875879}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MaiorcaB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Massacci19, author = {Fabio Massacci}, title = {Is "Deny Access" a Valid "Fail-Safe Default" Principle for Building Security in Cyberphysical Systems?}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {5}, pages = {90--93}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2918820}, doi = {10.1109/MSEC.2019.2918820}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Massacci19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Matheu-GarciaRS19, author = {Sara Nieves Matheu{-}Garc{\'{\i}}a and Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and Antonio F. Skarmeta}, title = {Toward a Cybersecurity Certification Framework for the Internet of Things}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {3}, pages = {66--76}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2904475}, doi = {10.1109/MSEC.2019.2904475}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Matheu-GarciaRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MazurczykCW19, author = {Wojciech Mazurczyk and Luca Caviglione and Steffen Wendzel}, title = {Recent Advancements in Digital Forensics, Part 2}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {1}, pages = {7--8}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2896857}, doi = {10.1109/MSEC.2019.2896857}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MazurczykCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Michael19, author = {James Bret Michael}, title = {Trustworthiness of Autonomous Machines in Armed Conflict}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {6}, pages = {4--6}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2938195}, doi = {10.1109/MSEC.2019.2938195}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Michael19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MomenHF19, author = {Nurul Momen and Majid Hatamian and Lothar Fritsch}, title = {Did App Privacy Improve After the GDPR?}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {6}, pages = {10--20}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2938445}, doi = {10.1109/MSEC.2019.2938445}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/MomenHF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/NestlerCA19, author = {Vincent Nestler and Tony Coulson and James D. Ashley III}, title = {The {NICE} Challenge Project: Providing Workforce Experience Before the Workforce}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {2}, pages = {73--78}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2018.2888784}, doi = {10.1109/MSEC.2018.2888784}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/NestlerCA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Oorschot19, author = {Paul C. van Oorschot}, title = {Software Security and Systematizing Knowledge}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {3}, pages = {4--6}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2904127}, doi = {10.1109/MSEC.2019.2904127}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Oorschot19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/OorschotS19, author = {Paul C. van Oorschot and Sean W. Smith}, title = {The Internet of Things: Security Challenges}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {5}, pages = {7--9}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2925918}, doi = {10.1109/MSEC.2019.2925918}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/OorschotS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Payer19, author = {Mathias Payer}, title = {The Fuzzing Hype-Train: How Random Testing Triggers Thousands of Crashes}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {1}, pages = {78--82}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2018.2889892}, doi = {10.1109/MSEC.2018.2889892}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Payer19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Peisert19, author = {Sean Peisert}, title = {Some Experiences in Developing Security Technology That Actually Get Used}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {2}, pages = {4--7}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2899711}, doi = {10.1109/MSEC.2019.2899711}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Peisert19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Petrlic19, author = {Ronald Petrlic}, title = {The General Data Protection Regulation: From a Data Protection Authority's (Technical) Perspective}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {6}, pages = {31--36}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2935701}, doi = {10.1109/MSEC.2019.2935701}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Petrlic19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Phillips19, author = {Andelka M. Phillips}, title = {Buying Your Genetic Self Online: Pitfalls and Potential Reforms in {DNA} Testing}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {3}, pages = {77--81}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2904128}, doi = {10.1109/MSEC.2019.2904128}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Phillips19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Raaijmakers19, author = {Stephan Raaijmakers}, title = {Artificial Intelligence for Law Enforcement: Challenges and Opportunities}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {5}, pages = {74--77}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2925649}, doi = {10.1109/MSEC.2019.2925649}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Raaijmakers19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RiaziRK19, author = {M. Sadegh Riazi and Bita Darvish Rouhani and Farinaz Koushanfar}, title = {Deep Learning on Private Data}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {6}, pages = {54--63}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2935666}, doi = {10.1109/MSEC.2019.2935666}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/RiaziRK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RicciBB19, author = {Joseph Ricci and Ibrahim M. Baggili and Frank Breitinger}, title = {Blockchain-Based Distributed Cloud Storage Digital Forensics: Where's the Beef?}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {1}, pages = {34--42}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2018.2875877}, doi = {10.1109/MSEC.2018.2875877}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/RicciBB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RouaniSJK19, author = {Bita Darvish Rouhani and Mohammad Samragh and Tara Javidi and Farinaz Koushanfar}, title = {Safe Machine Learning and Defeating Adversarial Attacks}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {2}, pages = {31--38}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2018.2888779}, doi = {10.1109/MSEC.2018.2888779}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/RouaniSJK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RuotiS19, author = {Scott Ruoti and Kent E. Seamons}, title = {Johnny's Journey Toward Usable Secure Email}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {6}, pages = {72--76}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2933683}, doi = {10.1109/MSEC.2019.2933683}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/RuotiS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SambasivanABBCG19, author = {Nithya Sambasivan and Nova Ahmed and Amna Batool and Elie Bursztein and Elizabeth F. Churchill and Laura Sanely Gayt{\'{a}}n{-}Lugo and Tara Matthews and David Nemer and Kurt Thomas and Sunny Consolvo}, title = {Toward Gender-Equitable Privacy and Security in South Asia}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {4}, pages = {71--77}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2912727}, doi = {10.1109/MSEC.2019.2912727}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/SambasivanABBCG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ScaifePT19, author = {Nolen Scaife and Christian Peeters and Patrick Traynor}, title = {More Cowbell: Lessons Learned in Developing the Skim Reaper}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {4}, pages = {10--17}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2914017}, doi = {10.1109/MSEC.2019.2914017}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ScaifePT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Schneck19, author = {Phyllis A. Schneck}, title = {Cybersecurity Compliance Is Necessary but Not Sufficient: Bad Guys Don't Follow Laws}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {1}, pages = {4--6}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2897041}, doi = {10.1109/MSEC.2019.2897041}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Schneck19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SchneiderMJMC19, author = {Moritz Schneider and Sinisa Matetic and Ari Juels and Andrew Miller and Srdjan Capkun}, title = {Secure Brokered Delegation Through DelegaTEE}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {4}, pages = {43--52}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2909712}, doi = {10.1109/MSEC.2019.2909712}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/SchneiderMJMC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Schneier19, author = {Bruce Schneier}, title = {Cybersecurity for the Public Interest}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {1}, pages = {84--83}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2018.2889891}, doi = {10.1109/MSEC.2018.2889891}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Schneier19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ShermanDBCSVVOG19, author = {Alan T. Sherman and Josiah Dykstra and Gregory V. Bard and Ankur Chattopadhyay and Filipo Sharevski and Rakesh M. Verma and Ryan Vrecenar and Linda Oliva and Enis Golaszewski and Dhananjay S. Phatak and Travis Scheponik and Geoffrey L. Herman and Dong San Choi and Spencer E. Offenberger and Peter Peterson}, title = {The {CATS} Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {6}, pages = {77--83}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2929812}, doi = {10.1109/MSEC.2019.2929812}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/ShermanDBCSVVOG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ShermanJZG19, author = {Alan T. Sherman and Farid Javani and Haibin Zhang and Enis Golaszewski}, title = {On the Origins and Variations of Blockchain Technologies}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {1}, pages = {72--77}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2893730}, doi = {10.1109/MSEC.2019.2893730}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ShermanJZG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ShermanPGLGKMRS19, author = {Alan T. Sherman and Peter A. H. Peterson and Enis Golaszewski and Edward LaFemina and Ethan Goldschen and Mohammed Khan and Lauren Mundy and Mykah Rather and Bryan Solis and Wubnyonga Tete and Edwin Valdez and Brian Weber and Damian Doyle and Casey O'Brien and Linda Oliva and Joseph Roundy and Jack Suess}, title = {Project-Based Learning Inspires Cybersecurity Students: {A} Scholarship-for-Service Research Study}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {3}, pages = {82--88}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2900595}, doi = {10.1109/MSEC.2019.2900595}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ShermanPGLGKMRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SiegelS19, author = {Joshua Siegel and Sanjay E. Sarma}, title = {A Cognitive Protection System for the Internet of Things}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {3}, pages = {40--48}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2018.2884860}, doi = {10.1109/MSEC.2018.2884860}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/SiegelS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SiegelS19a, author = {Joshua Eric Siegel and Sanjay E. Sarma}, title = {Using Open Channels to Trigger the Invited, Unintended Consequences of the Internet of Things}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {3}, pages = {49--55}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2901430}, doi = {10.1109/MSEC.2019.2901430}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/SiegelS19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SinghC19, author = {Jatinder Singh and Jennifer Cobbe}, title = {The Security Implications of Data Subject Rights}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {6}, pages = {21--30}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2914614}, doi = {10.1109/MSEC.2019.2914614}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/SinghC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SinglaB19, author = {Ankush Singla and Elisa Bertino}, title = {How Deep Learning Is Making Information Security More Intelligent}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {3}, pages = {56--65}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2902347}, doi = {10.1109/MSEC.2019.2902347}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/SinglaB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/StevensVRAM19, author = {Rock Stevens and Daniel Votipka and Elissa M. Redmiles and Colin Ahern and Michelle L. Mazurek}, title = {Applied Digital Threat Modeling: It Works}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {4}, pages = {35--42}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2909714}, doi = {10.1109/MSEC.2019.2909714}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/StevensVRAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TeneEGMZ19, author = {Omer Tene and Katrine Evans and Bruno Gencarelli and Gabe Maldoff and Gabriela Zanfir{-}Fortuna}, title = {{GDPR} at Year One: Enter the Designers and Engineers}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {6}, pages = {7--9}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2938196}, doi = {10.1109/MSEC.2019.2938196}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/TeneEGMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TianCJHNC19, author = {Hui Tian and Yuxiang Chen and Hong Jiang and Yongfeng Huang and Fulin Nan and Yonghong Chen}, title = {Public Auditing for Trusted Cloud Storage Services}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {1}, pages = {10--22}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2018.2875880}, doi = {10.1109/MSEC.2018.2875880}, timestamp = {Wed, 10 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/TianCJHNC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TothA19, author = {Kalman C. Toth and Alan Anderson{-}Priddy}, title = {Self-Sovereign Digital Identity: {A} Paradigm Shift for Identity}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {3}, pages = {17--27}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2018.2888782}, doi = {10.1109/MSEC.2018.2888782}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/TothA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TschofenigB19, author = {Hannes Tschofenig and Emmanuel Baccelli}, title = {Cyberphysical Security for the Masses: {A} Survey of the Internet Protocol Suite for Internet of Things Security}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {5}, pages = {47--57}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2923973}, doi = {10.1109/MSEC.2019.2923973}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/TschofenigB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ValenteWC19, author = {Junia Valente and Matthew Wynn and Alvaro A. C{\'{a}}rdenas}, title = {Stealing, Spying, and Abusing: Consequences of Attacks on Internet of Things Devices}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {5}, pages = {10--21}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2924167}, doi = {10.1109/MSEC.2019.2924167}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ValenteWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Williams19, author = {Laurie A. Williams}, title = {Science Leaves Clues}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {5}, pages = {4--6}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2925648}, doi = {10.1109/MSEC.2019.2925648}, timestamp = {Mon, 07 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Williams19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/YenerG19, author = {B{\"{u}}lent Yener and Tsvi Gal}, title = {Cybersecurity in the Era of Data Science: Examining New Adversarial Models}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {6}, pages = {46--53}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2907097}, doi = {10.1109/MSEC.2019.2907097}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/YenerG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ZouS19, author = {Yixin Zou and Florian Schaub}, title = {Beyond Mandatory: Making Data Breach Notifications Useful for Consumers}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {2}, pages = {67--72}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2897834}, doi = {10.1109/MSEC.2019.2897834}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/ZouS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.