Search dblp for Publications

export results for "toc:db/journals/ieeesp/ieeesp22.bht:"

 download as .bib file

@article{DBLP:journals/ieeesp/AielloR24,
  author       = {Samuel Aiello and
                  Bhaskar Prasad Rimal},
  title        = {Secure Access Service Edge Convergence: Recent Progress and Open Issues},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {2},
  pages        = {8--16},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2023.3326811},
  doi          = {10.1109/MSEC.2023.3326811},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AielloR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BackendalHP24,
  author       = {Matilda Backendal and
                  Miro Haller and
                  Kenny Paterson},
  title        = {End-to-End Encrypted Cloud Storage},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {2},
  pages        = {69--74},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2024.3352788},
  doi          = {10.1109/MSEC.2024.3352788},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BackendalHP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin24,
  author       = {Steven M. Bellovin},
  title        = {Degenerative AI?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {3},
  pages        = {88},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2024.3385549},
  doi          = {10.1109/MSEC.2024.3385549},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bezzi24,
  author       = {Michele Bezzi},
  title        = {Large Language Models and Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {2},
  pages        = {60--68},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2023.3345568},
  doi          = {10.1109/MSEC.2023.3345568},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bezzi24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BoddenPFG24,
  author       = {Eric Bodden and
                  Jens Pottebaum and
                  Markus Fockel and
                  Iris Gr{\"{a}}{\ss}ler},
  title        = {Evaluating Security Through Isolation and Defense in Depth},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {1},
  pages        = {69--72},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2023.3336028},
  doi          = {10.1109/MSEC.2023.3336028},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BoddenPFG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BrehmS24,
  author       = {Karoline Brehm and
                  Yan Shvartzshnaider},
  title        = {Understanding Privacy in Virtual Reality Classrooms: {A} Contextual
                  Integrity Perspective},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {1},
  pages        = {53--62},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2023.3336802},
  doi          = {10.1109/MSEC.2023.3336802},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BrehmS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CayirALACU24,
  author       = {Derin Cayir and
                  Abbas Acar and
                  Riccardo Lazzeretti and
                  Marco Angelini and
                  Mauro Conti and
                  A. Selcuk Uluagac},
  title        = {Augmenting Security and Privacy in the Virtual Realm: An Analysis
                  of Extended Reality Devices},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {1},
  pages        = {10--23},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2023.3332004},
  doi          = {10.1109/MSEC.2023.3332004},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CayirALACU24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CorbettDSHJ24,
  author       = {Matthew Corbett and
                  Brendan David{-}John and
                  Jiacheng Shang and
                  Y. Charlie Hu and
                  Bo Ji},
  title        = {Securing Bystander Privacy in Mixed Reality While Protecting the User
                  Experience},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {1},
  pages        = {33--42},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2023.3331649},
  doi          = {10.1109/MSEC.2023.3331649},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CorbettDSHJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Cristofaro24,
  author       = {Emiliano De Cristofaro},
  title        = {Synthetic Data: Methods, Use Cases, and Risks},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {3},
  pages        = {62--67},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2024.3371505},
  doi          = {10.1109/MSEC.2024.3371505},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Cristofaro24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/HamiltonKMR24,
  author       = {Vaughn Hamilton and
                  Gabriel Kaptchuk and
                  Allison McDonald and
                  Elissa M. Redmiles},
  title        = {Safer Digital Intimacy for Sex Workers and Beyond: {A} Technical Research
                  Agenda},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {2},
  pages        = {17--28},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2023.3324615},
  doi          = {10.1109/MSEC.2023.3324615},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/HamiltonKMR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Hutchings24,
  author       = {Alice Hutchings},
  title        = {The Amplification of Online Deviancy Through the Language of Violent
                  Crime, War, and Aggression},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {2},
  pages        = {81--84},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2024.3353428},
  doi          = {10.1109/MSEC.2024.3353428},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Hutchings24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Lyon24,
  author       = {Gregory Lyon},
  title        = {Trust in Data Security Protocols and Knowledge of Privacy and Security
                  Technology},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {2},
  pages        = {29--37},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2023.3329739},
  doi          = {10.1109/MSEC.2023.3329739},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Lyon24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MaianoBPSMCMA24,
  author       = {Luca Maiano and
                  Alexandra Benova and
                  Lorenzo Papa and
                  Mara Stockner and
                  Michela Marchetti and
                  Gianmarco Convertino and
                  Giuliana Mazzoni and
                  Irene Amerini},
  title        = {Human Versus Machine: {A} Comparative Analysis in Detecting Artificial
                  Intelligence-Generated Images},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {3},
  pages        = {77--86},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2024.3390555},
  doi          = {10.1109/MSEC.2024.3390555},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MaianoBPSMCMA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Massacci24,
  author       = {Fabio Massacci},
  title        = {The Holy Grail of Vulnerability Predictions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {1},
  pages        = {4--6},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2023.3333936},
  doi          = {10.1109/MSEC.2023.3333936},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Massacci24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MbakaT24,
  author       = {Winnie Mbaka and
                  Katja Tuma},
  title        = {Role of Gender in the Evaluation of Security Decisions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {2},
  pages        = {38--48},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2023.3343837},
  doi          = {10.1109/MSEC.2023.3343837},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MbakaT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Mentens24,
  author       = {Nele Mentens},
  title        = {Hardware Security in the Era of Emerging Device and System Technologies},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {3},
  pages        = {4--6},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2024.3379768},
  doi          = {10.1109/MSEC.2024.3379768},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Mentens24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MhaidliRFHS24,
  author       = {Abraham H. Mhaidli and
                  Shwetha Rajaram and
                  Selin Fidan and
                  Gina Herakovic and
                  Florian Schaub},
  title        = {Shockvertising, Malware, and a Lack of Accountability: Exploring Consumer
                  Risks of Virtual Reality Advertisements and Marketing Experiences},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {1},
  pages        = {43--52},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2023.3332105},
  doi          = {10.1109/MSEC.2023.3332105},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MhaidliRFHS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MoreiraMR24,
  author       = {Daniel Moreira and
                  S{\'{e}}bastien Marcel and
                  Anderson Rocha},
  title        = {Synthetic Realities and Artificial Intelligence-Generated Contents},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {3},
  pages        = {7--10},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2024.3388244},
  doi          = {10.1109/MSEC.2024.3388244},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MoreiraMR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/NairROS24,
  author       = {Vivek Nair and
                  Louis B. Rosenberg and
                  James F. O'Brien and
                  Dawn Song},
  title        = {Truth in Motion: The Unprecedented Risks and Opportunities of Extended
                  Reality Motion Data},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {1},
  pages        = {24--32},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2023.3330392},
  doi          = {10.1109/MSEC.2023.3330392},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/NairROS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Nissenbaum24,
  author       = {Helen Nissenbaum},
  title        = {{AI} Safety: {A} Poisoned Chalice?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {2},
  pages        = {94--96},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2024.3356848},
  doi          = {10.1109/MSEC.2024.3356848},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Nissenbaum24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/OHaganGMBJM24,
  author       = {Joseph O'Hagan and
                  Jan Gugenheimer and
                  Florian Mathis and
                  Jolie Bonner and
                  Richard Jones and
                  Mark McGill},
  title        = {A Viewpoint on the Societal Impact of Everyday Augmented Reality and
                  the Need for Perceptual Human Rights},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {1},
  pages        = {64--68},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2023.3333988},
  doi          = {10.1109/MSEC.2023.3333988},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/OHaganGMBJM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PallasKBHJNSUWWZ24,
  author       = {Frank Pallas and
                  Katharina Koerner and
                  Isabel Barber{\'{a}} and
                  Jaap{-}Henk Hoepman and
                  Meiko Jensen and
                  Nandita Rao Narla and
                  Nikita Samarin and
                  Max{-}Robert Ulbricht and
                  Isabel Wagner and
                  Kim Wuyts and
                  Christian Zimmermann},
  title        = {Privacy Engineering From Principles to Practice: {A} Roadmap},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {2},
  pages        = {86--92},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2024.3363829},
  doi          = {10.1109/MSEC.2024.3363829},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PallasKBHJNSUWWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PastorGalindoNR24,
  author       = {Javier Pastor{-}Galindo and
                  Pantaleone Nespoli and
                  Jos{\'{e}} A. Ruip{\'{e}}rez{-}Valiente},
  title        = {Large-Language-Model-Powered Agent-Based Framework for Misinformation
                  and Disinformation Research: Opportunities and Open Challenges},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {3},
  pages        = {24--36},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2024.3380511},
  doi          = {10.1109/MSEC.2024.3380511},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PastorGalindoNR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PiessensO24,
  author       = {Frank Piessens and
                  Paul C. van Oorschot},
  title        = {Side-Channel Attacks: {A} Short Tour},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {2},
  pages        = {75--80},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2024.3352848},
  doi          = {10.1109/MSEC.2024.3352848},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PiessensO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RamonVG24,
  author       = {Meike Ramon and
                  Matthew J. Vowels and
                  Matthew Groh},
  title        = {Deepfake Detection in Super-Recognizers and Police Officers},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {3},
  pages        = {68--76},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2024.3371030},
  doi          = {10.1109/MSEC.2024.3371030},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RamonVG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Redmiles24,
  author       = {Elissa M. Redmiles},
  title        = {Friction Matters: Balancing the Pursuit of Perfect Protection With
                  Target Hardening},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {1},
  pages        = {76--75},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2023.3333972},
  doi          = {10.1109/MSEC.2023.3333972},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Redmiles24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RoesnerK24,
  author       = {Franziska Roesner and
                  Tadayoshi Kohno},
  title        = {Security and Privacy in the Metaverse},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {1},
  pages        = {7--9},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2023.3333989},
  doi          = {10.1109/MSEC.2023.3333989},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RoesnerK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SabettaPLBSGBHFPPPMM24,
  author       = {Antonino Sabetta and
                  Serena Elisa Ponta and
                  Roc{\'{\i}}o Cabrera Lozoya and
                  Michele Bezzi and
                  Tommaso Sacchetti and
                  Matteo Greco and
                  Gerg{\"{o}} Balogh and
                  P{\'{e}}ter Heged{\"{u}}s and
                  Rudolf Ferenc and
                  Ranindya Paramitha and
                  Ivan Pashchenko and
                  Aurora Papotti and
                  {\'{A}}kos Mil{\'{a}}nkovich and
                  Fabio Massacci},
  title        = {Known Vulnerabilities of Open Source Projects: Where Are the Fixes?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {2},
  pages        = {49--59},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2023.3343836},
  doi          = {10.1109/MSEC.2023.3343836},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SabettaPLBSGBHFPPPMM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SunCHC24,
  author       = {Yeali S. Sun and
                  Zhi{-}Kang Chen and
                  Yi{-}Ting Huang and
                  Meng Chang Chen},
  title        = {Unleashing Malware Analysis and Understanding With Generative {AI}},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {3},
  pages        = {12--23},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2024.3384415},
  doi          = {10.1109/MSEC.2024.3384415},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SunCHC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/TariangCCPNV24,
  author       = {Diangarti Tariang and
                  Riccardo Corvi and
                  Davide Cozzolino and
                  Giovanni Poggi and
                  Koki Nagano and
                  Luisa Verdoliva},
  title        = {Synthetic Image Verification in the Era of Generative Artificial Intelligence:
                  What Works and What Isn't There yet},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {3},
  pages        = {37--49},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2024.3376637},
  doi          = {10.1109/MSEC.2024.3376637},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/TariangCCPNV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Williams24,
  author       = {Laurie A. Williams},
  title        = {Narrowing the Software Supply Chain Attack Vectors: The {SSDF} Is
                  Wonderful but not Enough},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {2},
  pages        = {4--7},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2024.3359798},
  doi          = {10.1109/MSEC.2024.3359798},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Williams24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Yavuz24,
  author       = {Can Yavuz},
  title        = {A Multidisciplinary Look at History and Future of Deepfake With Gartner
                  Hype Cycle},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {3},
  pages        = {50--61},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2024.3380324},
  doi          = {10.1109/MSEC.2024.3380324},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Yavuz24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics