Sign in
IEEE Secur. Priv.
2003
2010
2017
2024
2003
2024
Keyphrases
Publications
volume 22, number 1, 2024
Karoline Brehm
,
Yan Shvartzshnaider
Understanding Privacy in Virtual Reality Classrooms: A Contextual Integrity Perspective.
IEEE Secur. Priv.
22 (1) (2024)
Vivek Nair
,
Louis B. Rosenberg
,
James F. O'Brien
,
Dawn Song
Truth in Motion: The Unprecedented Risks and Opportunities of Extended Reality Motion Data.
IEEE Secur. Priv.
22 (1) (2024)
Matthew Corbett
,
Brendan David-John
,
Jiacheng Shang
,
Y. Charlie Hu
,
Bo Ji
Securing Bystander Privacy in Mixed Reality While Protecting the User Experience.
IEEE Secur. Priv.
22 (1) (2024)
Derin Cayir
,
Abbas Acar
,
Riccardo Lazzeretti
,
Marco Angelini
,
Mauro Conti
,
A. Selcuk Uluagac
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices.
IEEE Secur. Priv.
22 (1) (2024)
Franziska Roesner
,
Tadayoshi Kohno
Security and Privacy in the Metaverse.
IEEE Secur. Priv.
22 (1) (2024)
Joseph O'Hagan
,
Jan Gugenheimer
,
Florian Mathis
,
Jolie Bonner
,
Richard Jones
,
Mark McGill
A Viewpoint on the Societal Impact of Everyday Augmented Reality and the Need for Perceptual Human Rights.
IEEE Secur. Priv.
22 (1) (2024)
Elissa M. Redmiles
Friction Matters: Balancing the Pursuit of Perfect Protection With Target Hardening.
IEEE Secur. Priv.
22 (1) (2024)
Eric Bodden
,
Jens Pottebaum
,
Markus Fockel
,
Iris Gräßler
Evaluating Security Through Isolation and Defense in Depth.
IEEE Secur. Priv.
22 (1) (2024)
Fabio Massacci
The Holy Grail of Vulnerability Predictions.
IEEE Secur. Priv.
22 (1) (2024)
Abraham H. Mhaidli
,
Shwetha Rajaram
,
Selin Fidan
,
Gina Herakovic
,
Florian Schaub
Shockvertising, Malware, and a Lack of Accountability: Exploring Consumer Risks of Virtual Reality Advertisements and Marketing Experiences.
IEEE Secur. Priv.
22 (1) (2024)
volume 21, number 3, 2023
Trent Jaeger
,
Brent ByungHoon Kang
,
Nele Mentens
,
Cynthia Sturton
Impact of Emerging Hardware on Security and Privacy.
IEEE Secur. Priv.
21 (3) (2023)
Andres Meza
,
Francesco Restuccia
,
Jason Oberg
,
Dominic Rizzo
,
Ryan Kastner
Security Verification of the OpenTitan Hardware Root of Trust.
IEEE Secur. Priv.
21 (3) (2023)
Paul C. van Oorschot
Memory Errors and Memory Safety: A Look at Java and Rust.
IEEE Secur. Priv.
21 (3) (2023)
Kacper T. Gradon
Electric Sheep on the Pastures of Disinformation and Targeted Phishing Campaigns: The Security Implications of ChatGPT.
IEEE Secur. Priv.
21 (3) (2023)
Trent Jaeger
On Bridges and Software.
IEEE Secur. Priv.
21 (3) (2023)
volume 21, number 4, 2023
Khaled Sarieddine
,
Mohammad Ali Sayed
,
Danial Jafarigiv
,
Ribal Atallah
,
Mourad Debbabi
,
Chadi Assi
A Real-Time Cosimulation Testbed for Electric Vehicle Charging and Smart Grid Security.
IEEE Secur. Priv.
21 (4) (2023)
Nigel P. Smart
Computing on Encrypted Data.
IEEE Secur. Priv.
21 (4) (2023)
David M. Nicol
,
Gregory Shannon
,
Monika Akbar
,
Matt Bishop
,
Michael M. Chaney
,
Matthew E. Luallen
Toward Common Weakness Enumerations in Industrial Control Systems.
IEEE Secur. Priv.
21 (4) (2023)
Gabriela F. Ciocarlie
,
Jianying Zhou
Securing Critical Infrastructure Across Cyber and Physical Dimensions.
IEEE Secur. Priv.
21 (4) (2023)
Martin Strohmeier
,
Mauro Leonardi
,
Sergei Markochev
,
Fabio Ricciato
,
Matthias Schäfer
,
Vincent Lenders
In Pursuit of Aviation Cybersecurity: Experiences and Lessons From a Competitive Approach.
IEEE Secur. Priv.
21 (4) (2023)
Steven M. Bellovin
Is Cybersecurity Liability a Liability?
IEEE Secur. Priv.
21 (4) (2023)
Luis Burbano
,
Kunal Garg
,
Santiago J. Leudo
,
Alvaro A. Cárdenas
,
Ricardo G. Sanfelice
Online Attack Recovery in Cyberphysical Systems.
IEEE Secur. Priv.
21 (4) (2023)
Constantine Doumanidis
,
Yongyu Xie
,
Prashant Hari Narayan Rajput
,
Ryan Pickren
,
Burak Sahin
,
Saman Zonouz
,
Michail Maniatakos
Dissecting the Industrial Control Systems Software Supply Chain.
IEEE Secur. Priv.
21 (4) (2023)
Adeen Ayub
,
Wooyeon Jo
,
Syed Ali Qasim
,
Irfan Ahmed
How Are Industrial Control Systems Insecure by Design? A Deeper Insight Into Real-World Programmable Logic Controllers.
IEEE Secur. Priv.
21 (4) (2023)
Aditya P. Mathur
Reconfigurable Digital Twin to Support Research, Education, and Training in the Defense of Critical Infrastructure.
IEEE Secur. Priv.
21 (4) (2023)
Sean Peisert
On Software Infrastructure: Develop, Prove, Profit?
IEEE Secur. Priv.
21 (4) (2023)
Rodrigo Roman
,
Cristina Alcaraz
,
Javier López
,
Kouichi Sakurai
Current Perspectives on Securing Critical Infrastructures' Supply Chains.
IEEE Secur. Priv.
21 (4) (2023)
volume 21, number 5, 2023
Abdul Majeed
,
Seong Oun Hwang
Rectification of Syntactic and Semantic Privacy Mechanisms.
IEEE Secur. Priv.
21 (5) (2023)
Konstantinos Adamos
,
Fabio Di Franco
,
Athanasios Vasileios Grammatopoulos
An Analysis of European Union Cybersecurity Higher Education Programs Through the Crowd-Sourced Database CyberHEAD.
IEEE Secur. Priv.
21 (5) (2023)
Tadayoshi Kohno
In Your Eyes.
IEEE Secur. Priv.
21 (5) (2023)
Frank Piessens
Transient Execution Attacks.
IEEE Secur. Priv.
21 (5) (2023)
Padmanabhan Krishnan
,
Cristina Cifuentes
,
Li Li
,
Tegawendé F. Bissyandé
,
Jacques Klein
Why Is Static Application Security Testing Hard to Learn?
IEEE Secur. Priv.
21 (5) (2023)
Daniel Arp
,
Erwin Quiring
,
Feargus Pendlebury
,
Alexander Warnecke
,
Fabio Pierazzi
,
Christian Wressnegger
,
Lorenzo Cavallaro
,
Konrad Rieck
Lessons Learned on Machine Learning for Computer Security.
IEEE Secur. Priv.
21 (5) (2023)
Priyanka Nanayakkara
,
Jessica Hullman
What's Driving Conflicts Around Differential Privacy for the U.S. Census.
IEEE Secur. Priv.
21 (5) (2023)
Daniel E. Geer
Convergence: Ongoing.
IEEE Secur. Priv.
21 (5) (2023)
Eric Ruzomberka
,
David J. Love
,
Christopher G. Brinton
,
Arpit Gupta
,
Chih-Chun Wang
,
H. Vincent Poor
Challenges and Opportunities for Beyond-5G Wireless Security.
IEEE Secur. Priv.
21 (5) (2023)
Jingwei Wu
,
Wanxi Mao
,
Yuxin Deng
,
Jinghong Xu
Child Safety and Data Privacy in Smart Homes With Speakers: Comparison of Privacy Policies in the United States and China.
IEEE Secur. Priv.
21 (5) (2023)
Sebastian Obermeier
,
Thomas Jösler
,
Stephan Renggli
,
Maurus Unternährer
,
Bernhard M. Hämmerli
Automating Recovery in Mixed Operation Technology/IT Critical Infrastructures.
IEEE Secur. Priv.
21 (5) (2023)
volume 21, number 6, 2023
Santiago Torres-Arias
,
Daniel E. Geer
,
John Speed Meyers
A Viewpoint on Knowing Software: Bill of Materials Quality When You See It.
IEEE Secur. Priv.
21 (6) (2023)
Musard Balliu
,
Benoit Baudry
,
Sofia Bobadilla
,
Mathias Ekstedt
,
Martin Monperrus
,
Javier Ron Arteaga
,
Aman Sharma
,
Gabriel Skoglund
,
César Soto-Valero
,
Martin Wittlinger
Challenges of Producing Software Bill of Materials for Java.
IEEE Secur. Priv.
21 (6) (2023)
Fabio Massacci
,
Laurie A. Williams
Software Supply Chain Security [Guest Editors' Introduction].
IEEE Secur. Priv.
21 (6) (2023)
Marcela S. Melara
,
Santiago Torres-Arias
A Viewpoint on Software Supply Chain Security: Are We Getting Lost in Translation?
IEEE Secur. Priv.
21 (6) (2023)
Matthias Eckhart
,
Andreas Ekelhart
,
David Allison
,
Magnus Almgren
,
Katharina Ceesay-Seitz
,
Helge Janicke
,
Simin Nadjm-Tehrani
,
Awais Rashid
,
Mark Yampolskiy
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives.
IEEE Secur. Priv.
21 (6) (2023)
Mary Ellen Zurko
Unusable Security for Attackers [From the Editors].
IEEE Secur. Priv.
21 (6) (2023)
Ákos Milánkovich
,
Katja Tuma
Delta Security Certification for Software Supply Chains.
IEEE Secur. Priv.
21 (6) (2023)
Florian Kerschbaum
,
Nils Lukas
Privacy-Preserving Machine Learning [Cryptography].
IEEE Secur. Priv.
21 (6) (2023)
Nusrat Zahan
,
Parth Kanakiya
,
Brian Hambleton
,
Shohanuzzaman Shohan
,
Laurie A. Williams
OpenSSF Scorecard: On the Path Toward Ecosystem-Wide Automated Security Metrics.
IEEE Secur. Priv.
21 (6) (2023)
Piergiorgio Ladisa
,
Serena Elisa Ponta
,
Antonino Sabetta
,
Matias Martinez
,
Olivier Barais
Journey to the Center of Software Supply Chain Attacks.
IEEE Secur. Priv.
21 (6) (2023)
Bruce Schneier
Trustworthy AI Means Public AI [Last Word].
IEEE Secur. Priv.
21 (6) (2023)
Marcel Fourné
,
Dominik Wermke
,
Sascha Fahl
,
Yasemin Acar
A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.
IEEE Secur. Priv.
21 (6) (2023)