Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ieeesp/ieeesp22.bht:"
@article{DBLP:journals/ieeesp/AielloR24, author = {Samuel Aiello and Bhaskar Prasad Rimal}, title = {Secure Access Service Edge Convergence: Recent Progress and Open Issues}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {2}, pages = {8--16}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2023.3326811}, doi = {10.1109/MSEC.2023.3326811}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/AielloR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BackendalHP24, author = {Matilda Backendal and Miro Haller and Kenny Paterson}, title = {End-to-End Encrypted Cloud Storage}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {2}, pages = {69--74}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2024.3352788}, doi = {10.1109/MSEC.2024.3352788}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BackendalHP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin24, author = {Steven M. Bellovin}, title = {Degenerative AI?}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {3}, pages = {88}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2024.3385549}, doi = {10.1109/MSEC.2024.3385549}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bezzi24, author = {Michele Bezzi}, title = {Large Language Models and Security}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {2}, pages = {60--68}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2023.3345568}, doi = {10.1109/MSEC.2023.3345568}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Bezzi24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BoddenPFG24, author = {Eric Bodden and Jens Pottebaum and Markus Fockel and Iris Gr{\"{a}}{\ss}ler}, title = {Evaluating Security Through Isolation and Defense in Depth}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {1}, pages = {69--72}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2023.3336028}, doi = {10.1109/MSEC.2023.3336028}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BoddenPFG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BrehmS24, author = {Karoline Brehm and Yan Shvartzshnaider}, title = {Understanding Privacy in Virtual Reality Classrooms: {A} Contextual Integrity Perspective}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {1}, pages = {53--62}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2023.3336802}, doi = {10.1109/MSEC.2023.3336802}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BrehmS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CayirALACU24, author = {Derin Cayir and Abbas Acar and Riccardo Lazzeretti and Marco Angelini and Mauro Conti and A. Selcuk Uluagac}, title = {Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {1}, pages = {10--23}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2023.3332004}, doi = {10.1109/MSEC.2023.3332004}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/CayirALACU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CorbettDSHJ24, author = {Matthew Corbett and Brendan David{-}John and Jiacheng Shang and Y. Charlie Hu and Bo Ji}, title = {Securing Bystander Privacy in Mixed Reality While Protecting the User Experience}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {1}, pages = {33--42}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2023.3331649}, doi = {10.1109/MSEC.2023.3331649}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/CorbettDSHJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Cristofaro24, author = {Emiliano De Cristofaro}, title = {Synthetic Data: Methods, Use Cases, and Risks}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {3}, pages = {62--67}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2024.3371505}, doi = {10.1109/MSEC.2024.3371505}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Cristofaro24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/HamiltonKMR24, author = {Vaughn Hamilton and Gabriel Kaptchuk and Allison McDonald and Elissa M. Redmiles}, title = {Safer Digital Intimacy for Sex Workers and Beyond: {A} Technical Research Agenda}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {2}, pages = {17--28}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2023.3324615}, doi = {10.1109/MSEC.2023.3324615}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/HamiltonKMR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Hutchings24, author = {Alice Hutchings}, title = {The Amplification of Online Deviancy Through the Language of Violent Crime, War, and Aggression}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {2}, pages = {81--84}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2024.3353428}, doi = {10.1109/MSEC.2024.3353428}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Hutchings24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Lyon24, author = {Gregory Lyon}, title = {Trust in Data Security Protocols and Knowledge of Privacy and Security Technology}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {2}, pages = {29--37}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2023.3329739}, doi = {10.1109/MSEC.2023.3329739}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Lyon24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MaianoBPSMCMA24, author = {Luca Maiano and Alexandra Benova and Lorenzo Papa and Mara Stockner and Michela Marchetti and Gianmarco Convertino and Giuliana Mazzoni and Irene Amerini}, title = {Human Versus Machine: {A} Comparative Analysis in Detecting Artificial Intelligence-Generated Images}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {3}, pages = {77--86}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2024.3390555}, doi = {10.1109/MSEC.2024.3390555}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MaianoBPSMCMA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Massacci24, author = {Fabio Massacci}, title = {The Holy Grail of Vulnerability Predictions}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {1}, pages = {4--6}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2023.3333936}, doi = {10.1109/MSEC.2023.3333936}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Massacci24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MbakaT24, author = {Winnie Mbaka and Katja Tuma}, title = {Role of Gender in the Evaluation of Security Decisions}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {2}, pages = {38--48}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2023.3343837}, doi = {10.1109/MSEC.2023.3343837}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MbakaT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Mentens24, author = {Nele Mentens}, title = {Hardware Security in the Era of Emerging Device and System Technologies}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {3}, pages = {4--6}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2024.3379768}, doi = {10.1109/MSEC.2024.3379768}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Mentens24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MhaidliRFHS24, author = {Abraham H. Mhaidli and Shwetha Rajaram and Selin Fidan and Gina Herakovic and Florian Schaub}, title = {Shockvertising, Malware, and a Lack of Accountability: Exploring Consumer Risks of Virtual Reality Advertisements and Marketing Experiences}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {1}, pages = {43--52}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2023.3332105}, doi = {10.1109/MSEC.2023.3332105}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/MhaidliRFHS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MoreiraMR24, author = {Daniel Moreira and S{\'{e}}bastien Marcel and Anderson Rocha}, title = {Synthetic Realities and Artificial Intelligence-Generated Contents}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {3}, pages = {7--10}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2024.3388244}, doi = {10.1109/MSEC.2024.3388244}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MoreiraMR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/NairROS24, author = {Vivek Nair and Louis B. Rosenberg and James F. O'Brien and Dawn Song}, title = {Truth in Motion: The Unprecedented Risks and Opportunities of Extended Reality Motion Data}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {1}, pages = {24--32}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2023.3330392}, doi = {10.1109/MSEC.2023.3330392}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/NairROS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Nissenbaum24, author = {Helen Nissenbaum}, title = {{AI} Safety: {A} Poisoned Chalice?}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {2}, pages = {94--96}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2024.3356848}, doi = {10.1109/MSEC.2024.3356848}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Nissenbaum24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/OHaganGMBJM24, author = {Joseph O'Hagan and Jan Gugenheimer and Florian Mathis and Jolie Bonner and Richard Jones and Mark McGill}, title = {A Viewpoint on the Societal Impact of Everyday Augmented Reality and the Need for Perceptual Human Rights}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {1}, pages = {64--68}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2023.3333988}, doi = {10.1109/MSEC.2023.3333988}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/OHaganGMBJM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PallasKBHJNSUWWZ24, author = {Frank Pallas and Katharina Koerner and Isabel Barber{\'{a}} and Jaap{-}Henk Hoepman and Meiko Jensen and Nandita Rao Narla and Nikita Samarin and Max{-}Robert Ulbricht and Isabel Wagner and Kim Wuyts and Christian Zimmermann}, title = {Privacy Engineering From Principles to Practice: {A} Roadmap}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {2}, pages = {86--92}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2024.3363829}, doi = {10.1109/MSEC.2024.3363829}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/PallasKBHJNSUWWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PastorGalindoNR24, author = {Javier Pastor{-}Galindo and Pantaleone Nespoli and Jos{\'{e}} A. Ruip{\'{e}}rez{-}Valiente}, title = {Large-Language-Model-Powered Agent-Based Framework for Misinformation and Disinformation Research: Opportunities and Open Challenges}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {3}, pages = {24--36}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2024.3380511}, doi = {10.1109/MSEC.2024.3380511}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/PastorGalindoNR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PiessensO24, author = {Frank Piessens and Paul C. van Oorschot}, title = {Side-Channel Attacks: {A} Short Tour}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {2}, pages = {75--80}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2024.3352848}, doi = {10.1109/MSEC.2024.3352848}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/PiessensO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RamonVG24, author = {Meike Ramon and Matthew J. Vowels and Matthew Groh}, title = {Deepfake Detection in Super-Recognizers and Police Officers}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {3}, pages = {68--76}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2024.3371030}, doi = {10.1109/MSEC.2024.3371030}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/RamonVG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Redmiles24, author = {Elissa M. Redmiles}, title = {Friction Matters: Balancing the Pursuit of Perfect Protection With Target Hardening}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {1}, pages = {76--75}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2023.3333972}, doi = {10.1109/MSEC.2023.3333972}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Redmiles24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RoesnerK24, author = {Franziska Roesner and Tadayoshi Kohno}, title = {Security and Privacy in the Metaverse}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {1}, pages = {7--9}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2023.3333989}, doi = {10.1109/MSEC.2023.3333989}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/RoesnerK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SabettaPLBSGBHFPPPMM24, author = {Antonino Sabetta and Serena Elisa Ponta and Roc{\'{\i}}o Cabrera Lozoya and Michele Bezzi and Tommaso Sacchetti and Matteo Greco and Gerg{\"{o}} Balogh and P{\'{e}}ter Heged{\"{u}}s and Rudolf Ferenc and Ranindya Paramitha and Ivan Pashchenko and Aurora Papotti and {\'{A}}kos Mil{\'{a}}nkovich and Fabio Massacci}, title = {Known Vulnerabilities of Open Source Projects: Where Are the Fixes?}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {2}, pages = {49--59}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2023.3343836}, doi = {10.1109/MSEC.2023.3343836}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/SabettaPLBSGBHFPPPMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SunCHC24, author = {Yeali S. Sun and Zhi{-}Kang Chen and Yi{-}Ting Huang and Meng Chang Chen}, title = {Unleashing Malware Analysis and Understanding With Generative {AI}}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {3}, pages = {12--23}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2024.3384415}, doi = {10.1109/MSEC.2024.3384415}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/SunCHC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TariangCCPNV24, author = {Diangarti Tariang and Riccardo Corvi and Davide Cozzolino and Giovanni Poggi and Koki Nagano and Luisa Verdoliva}, title = {Synthetic Image Verification in the Era of Generative Artificial Intelligence: What Works and What Isn't There yet}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {3}, pages = {37--49}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2024.3376637}, doi = {10.1109/MSEC.2024.3376637}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/TariangCCPNV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Williams24, author = {Laurie A. Williams}, title = {Narrowing the Software Supply Chain Attack Vectors: The {SSDF} Is Wonderful but not Enough}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {2}, pages = {4--7}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2024.3359798}, doi = {10.1109/MSEC.2024.3359798}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Williams24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Yavuz24, author = {Can Yavuz}, title = {A Multidisciplinary Look at History and Future of Deepfake With Gartner Hype Cycle}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {3}, pages = {50--61}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2024.3380324}, doi = {10.1109/MSEC.2024.3380324}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Yavuz24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.