default search action
IEEE Security & Privacy, Volume 13
Volume 13, Number 1, January - February 2015
- Bill G. Horne:
Umbrellas and Octopuses. 3-5 - Gary McGraw:
Silver Bullet Talks with Brian Krebs. 7-11 - Hilarie Orman, Charles P. Pfleeger:
Mathematics and Physics Build a New Future for Secure Communication [Guest editors' introduction]. 12-13 - Wade Trappe, Richard E. Howard, Robert S. Moore:
Low-Energy Security: Limits and Opportunities in the Internet of Things. 14-21 - David W. Archer, Kurt Rohloff:
Computing with Data Privacy: Steps toward Realization. 22-29 - Logan O. Mailloux, Michael R. Grimaila, Douglas D. Hodson, Gerald Baumgartner, Colin McLaughlin:
Performance Evaluations of Quantum Key Distribution System Architectures. 30-40 - Ioana Boureanu, Serge Vaudenay:
Challenges in Distance Bounding. 41-48 - Mark T. Maybury:
Toward the Assured Cyberspace Advantage: Air Force Cyber Vision 2025. 49-56 - Ricardo Padilha, Fernando Pedone:
Confidentiality in the Cloud. 57-60 - Melissa Dark:
Thinking about Cybersecurity. 61-65 - Emil Simion:
The Relevance of Statistical Tests in Cryptography. 66-70 - Budi Arief, Mohd Azeem Bin Adzmi, Thomas Gross:
Understanding Cybercrime from Its Stakeholders' Perspectives: Part 1-Attackers. 71-76 - Rahul Telang:
Policy Framework for Data Breaches. 77-79 - Daniel E. Geer Jr.:
Less Is More: Saving the Internet from Itself. 80
Volume 13, Number 2, March - April 2015
- Jeremy Epstein:
The Whole Is Less than the Sum of the Parts. 3-5 - Gary McGraw:
Silver Bullet Talks with Whitfield Diffie. 7-10 - Terry Benzel:
An Enduring Symposium for Leading Research in Security and Privacy. 12-13 - Sai Teja Peddinti, Aleksandra Korolova, Elie Bursztein, Geetanjali Sampemane:
Understanding Sensitivity by Analyzing Anonymity [Guest editor's introduction]. 14-21 - Susan Hohenberger, Steven A. Myers, Rafael Pass, Abhi Shelat:
An Overview of ANONIZE: A Large-Scale Anonymous Survey System. 22-29 - Per Larsen, Stefan Brunthaler, Michael Franz:
Automatic Software Diversity. 30-37 - Zongwei Zhou, Miao Yu, Virgil D. Gligor:
Dancing with Giants: Wimpy Kernels for On-Demand I/O Isolation. 38-46 - Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, Radu Sion:
Introspections on the Semantic Gap. 48-55 - Mike Bond, Marios O. Choudary, Steven J. Murdoch, Sergei P. Skorobogatov, Ross J. Anderson:
Be Prepared: The EMV Preplay Attack. 56-64 - Vincent Lenders, Axel Tanner, Albert Blarer:
Gaining an Edge in Cyberspace with Advanced Situational Awareness. 65-74 - Melissa Dark, Jelena Mirkovic:
Evaluation Theory and Practice Applied to Cybersecurity Education. 75-80 - Graham Steel:
Automated Proof and Flaw-Finding Tools in Cryptography. 81-83 - Budi Arief, Mohd Azeem Bin Adzmi:
Understanding Cybercrime from Its Stakeholders' Perspectives: Part 2-Defenders and Victims. 84-88 - Wojciech Mazurczyk, Luca Caviglione:
Information Hiding as a Challenge for Malware Detection. 89-93 - Sean W. Smith, John S. Erickson:
Never Mind Pearl Harbor-What about a Cyber Love Canal? 94-98 - Michael Lesk:
Safety Risks-Human Error or Mechanical Failure?: Lessons from Railways. 99-102 - Frederik J. Zuiderveen Borgesius:
Informed Consent: We Can Do Better to Defend Privacy. 103-107 - Bruce Schneier:
The Security Value of Muddling Through. 108
Volume 13, Number 3, May - June 2015
- Susan Landau:
What Was Samsung Thinking? 3-4 - Gary McGraw:
Silver Bullet Talks with L. Jean Camp. 5-7 - Kleanthis Dellios, Dimitrios Papanikas, Despina Polemi:
Information Security Compliance over Intelligent Transport Systems: Is IT Possible? 9-15 - Nir Kshetri:
India's Cybersecurity Landscape: The Roles of the Private Sector and Public-Private Partnership. 16-23 - David A. Basin, Cas Cremers, Kunihiko Miyazaki, Sasa Radomirovic, Dai Watanabe:
Improving the Security of Cryptographic Protocol Standards. 24-31 - Patricia Arias Cabarcos, Florina Almenárez, Rubén Trapero, Daniel Díaz Sánchez, Andrés Marín López:
Blended Identity: Pervasive IdM for Continuous Authentication. 32-39 - Hamilton A. Turner, Jules White, Jaime A. Camelio, Christopher Williams, Brandon Amos, Robert Parker:
Bad Parts: Are Our Manufacturing Systems at Risk of Silent Cyberattacks? 40-47 - Kjell Jørgen Hole:
Diversity Reduces the Impact of Malware. 48-54 - Jeremy Epstein:
Weakness in Depth: A Voting Machine's Demise. 55-58 - Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
End-to-End Verifiability in Voting Systems, from Theory to Practice. 59-62 - Jelena Mirkovic, Melissa Dark, Wenliang Du, Giovanni Vigna, Tamara Denning:
Evaluating Cybersecurity Education Interventions: Three Case Studies. 63-69 - Liam M. Mayron:
Biometric Authentication on Mobile Devices. 70-73 - J. Adam Crain, Sergey Bratus:
Bolt-On Security Extensions for Industrial Control System Protocols: A Case Study of DNP3 SAv5. 74-79 - M. Angela Sasse:
Scaring and Bullying People into Security Won't Work. 80-83 - Jonathan Margulies:
A Developer's Guide to Audit Logging. 84-86 - Kat Krol, Sören Preibusch:
Effortless Privacy Negotiations. 88-91 - Steven M. Bellovin:
What a Real Cybersecurity Bill Should Address. 92
Volume 13, Number 4, July - August 2015
- Terry Benzel:
A Strategic Plan for Cybersecurity Research and Development. 3-5 - Gary McGraw:
Silver Bullet Talks with Katie Moussouris. 7-9 - Shari Lawrence Pfleeger:
Learning from Other Disciplines. 10-11 - Denise L. Anthony, Timothy Stablein, Emily K. Carian:
Big Brother in the Information Age: Concerns about Government Information Gathering over Time. 12-19 - Julie Steinke, Balca Bolunmez, Laura Fletcher, Vicki Wang, Alan J. Tomassetti, Kristin M. Repchick, Stephen J. Zaccaro, Reeshad S. Dalal, Lois E. Tetrick:
Improving Cybersecurity Incident Response Team Effectiveness Using Teams-Based Research. 20-29 - Bilal Al Sabbagh, Stewart Kowalski:
A Socio-technical Framework for Threat Modeling a Software Supply Chain. 30-39 - Kjell Jørgen Hole:
Toward Anti-fragility: A Malware-Halting Technique. 40-46 - Christos Dimitrakakis, Aikaterini Mitrokotsa:
Distance-Bounding Protocols: Are You Close Enough? 47-51 - David Gugelmann, Pascal Studerus, Vincent Lenders, Bernhard Ager:
Can Content-Based Data Loss Prevention Solutions Prevent Data Leakage in Web Traffic? 52-59 - Rohit Tyagi, Tuhin Paul, B. S. Manoj, B. Thanudas:
Packet Inspection for Unauthorized OS Detection in Enterprises. 60-65 - Jared DeMott:
Bypassing EMET 4.1. 66-72 - John Knight:
The Importance of Security Cases: Proof Is Good, But Not Enough. 73-75 - Michael Lesk:
Ideas Ahead of Their Time: Digital Time Stamping. 76-79 - Jonathan Margulies:
Garage Door Openers: An Internet of Things Case Study. 80-83 - Monica T. Whitty:
Mass-Marketing Fraud: A Growing Concern. 84-87 - Daniel E. Geer Jr.:
The Right to Be Unobserved. 88
Volume 13, Number 5, September - October 2015
- Robin E. Bloomfield:
Autonomy, Robotics, and Dependability. 3-5 - Gary McGraw:
Silver Bullet Talks with Bart Preneel. 8-10 - Massimo Felici, Nick Wainwright, Fabio Bisogni, Simona Cavallini:
What's New in the Economics of Cybersecurity?: Observational and Empirical Studies. 12-15 - Hadi Asghari, Michel J. G. van Eeten, Johannes M. Bauer:
Economics of Fighting Botnets: Lessons from a Decade of Mitigation. 16-23 - Sören Preibusch:
The Value of Web Search Privacy. 24-32 - Tristan Caulfield, David J. Pym:
Improving Security Policy Decisions with Models. 34-41 - Clementina Bruno, Luca Guidi, Azahara Lorite-Espejo, Daniela Pestonesi:
Assessing a Potential Cyberattack on the Italian Electric System. 42-51 - Martina de Gramatica, Fabio Massacci, Woohyun Shim, Alessandra Tedeschi, Julian Williams:
IT Interdependence and the Economic Fairness of Cybersecurity Regulations for Civil Aviation. 52-61 - Zahid Akhtar, Christian Micheloni, Gian Luca Foresti:
Biometric Liveness Detection: Challenges and Research Opportunities. 63-72 - Masooda N. Bashir, April Lambert, Boyi Guo, Nasir D. Memon, Tzipora Halevi:
Cybersecurity Competitions: The Human Angle. 74-79 - Katrine Evans:
Vidal-Hall and Risk Management for Privacy Breaches. 80-84 - Gilles Barthe:
High-Assurance Cryptography: Cryptographic Software We Can Trust. 86-89 - Juhee Kwon, M. Eric Johnson:
Protecting Patient Data-The Economic Perspective of Healthcare Security. 90-95 - Jonathan Margulies:
Securing Cloud-Based Applications, Part 1. 96-98 - David Modic, Ross J. Anderson:
It's All Over but the Crying: The Emotional and Financial Impact of Internet Fraud. 99-103 - Daniel E. Geer Jr.:
Children of the Magenta. 104
Volume 13, Number 6, November - December 2015
- Shari Lawrence Pfleeger:
Spider-Man, Hubris, and the Future of Security and Privacy. 3-10 - Gary McGraw:
Silver Bullet Talks with Steven M. Bellovin and Matthew Green. 12-15 - Shari Lawrence Pfleeger:
Lessons Learned by Our Editorial Board. 16-17 - Rolf Oppliger:
Quantitative Risk Analysis in Information Security Management: A Modern Fairy Tale. 18-21 - Charles P. Pfleeger:
Lesson Learned: Security is Inevitable. 22-28 - Valerio Bellandi, Stelvio Cimato, Ernesto Damiani, Gabriele Gianini, Antonio Zilli:
Toward Economic-Aware Risk Assessment on the Cloud. 30-37 - Per Håkon Meland, Inger Anne Tøndel, Bjørnar Solhaug:
Mitigating Risk with Cyberinsurance. 38-43 - Artemis D. Avgerou, Yannis C. Stamatiou:
Privacy Awareness Diffusion in Social Networks. 44-50 - Jungwoo Ryoo, Rick Kazman, Priya Anand:
Architectural Analysis for Security. 52-59 - Rakesh M. Verma, Murat Kantarcioglu, David J. Marchette, Ernst L. Leiss, Thamar Solorio:
Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students. 60-65 - Jeff Kosseff:
A New Legal Framework for Online Anonymity: California's Privacy-Based Approach. 66-70 - Jia Song, Jim Alves-Foss:
The DARPA Cyber Grand Challenge: A Competitor's Perspective. 72-76 - Atif M. Memon, Ali Anwar:
Colluding Apps: Tomorrow's Mobile Malware Threat. 77-81 - Harold Thimbleby, Ross Koppel:
The Healthtech Declaration. 82-84 - Michael Lesk:
License Creep. 85-88 - Andrew A. Adams:
Possessing Mobile Devices. 89-95 - Steven M. Bellovin:
The Key to the Key. 96
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.