


default search action
IEEE Security & Privacy, Volume 12
Volume 12, Number 1, January - February 2014
- Bill G. Horne:
Humans in the Loop. 3-4 - Gary McGraw:
Silver Bullet Talks with Jon Callas. 6-8 - Lee Garber:
Security, Privacy, Policy, and Dependability Roundup. 9-10 - Martina Angela Sasse, Charles C. Palmer:
Protecting You. 11-13 - Cormac Herley:
More Is Not the Answer. 14-19 - Simson L. Garfinkel
:
Leaking Sensitive Information in Complex Document Files-and How to Prevent It. 20-27 - Deanna D. Caputo, Shari Lawrence Pfleeger, Jesse D. Freeman, M. Eric Johnson
:
Going Spear Phishing: Exploring Embedded Training and Awareness. 28-38 - Martina Angela Sasse, Charles C. Palmer, Markus Jakobsson, Sunny Consolvo, Rick Wash
, L. Jean Camp:
Helping You Protect You. 39-42 - Ying-Dar Lin, Chia-Yin Lee, Hao-Chuan Tsai:
Redefining Security Criteria for Networking Devices with Case Studies. 43-53 - Moti Geva, Amir Herzberg
, Yehoshua Gev:
Bandwidth Distributed Denial of Service: Attacks and Defenses. 54-61 - Susan Landau:
Highlights from Making Sense of Snowden, Part II: What's Significant in the NSA Revelations. 62-64 - George Candea:
The Tests-versus-Proofs Conundrum. 65-68 - Prabir Bhattacharya, Li Yang, Minzhe Guo, Kai Qian, Ming Yang:
Learning Mobile Security with Labware. 69-72 - Paul Ohm:
Should Sniffing Wi-Fi Be Illegal? 73-76 - David Eckhoff, Christoph Sommer
:
Driving for Big Data? Privacy Concerns in Vehicular Networking. 77-79 - Richard Ford, Marco M. Carvalho
:
Protecting Me. 80-82 - Sergey Bratus, Trey Darley, Michael E. Locasto, Meredith L. Patterson, Rebecca Shapiro, Anna Shubina:
Beyond Planted Bugs in "Trusting Trust": The Input-Processing Frontier. 83-87 - Daniel E. Geer Jr.:
Polarization. 88
Volume 12, Number 2, March - April 2014
- Gary McGraw:
Silver Bullet Talks with Matthew Green. 7-10 - Lee Garber:
Security, Privacy, Policy, and Dependability Roundup. 11-13 - Luanne Goldrich, Carl E. Landwehr:
Moving Target [Guest editors' introduction]. 14-15 - Hamed Okhravi, Thomas Hobson, David Bigelow, William W. Streilein:
Finding Focus in the Blur of Moving-Target Techniques. 16-26 - Per Larsen, Stefan Brunthaler
, Michael Franz:
Security through Diversity: Are We There Yet? 28-35 - Glenn A. Fink
, Jereme N. Haack, A. David McKinnon
, Errin W. Fulp:
Defense on the Move: Ant-Based Cyber Defense. 36-43 - Cherita L. Corbett, Jason Uher, Jarriel Cook, Angela Dalton:
Countering Intelligent Jamming with Full Protocol Stack Agility. 44-50 - Partha P. Pal
, Richard E. Schantz, Aaron Paulos, Brett Benyo
:
Managed Execution Environment as a Moving-Target Defense Infrastructure. 51-59 - Fernand Lone Sang, Vincent Nicomette, Yves Deswarte:
A Tool to Analyze Potential I/O Attacks against PCs. 60-66 - William H. Sanders:
Quantitative Security Metrics: Unattainable Holy Grail or a Vital Breakthrough within Our Reach? 67-69 - Diana Maimut
, Reza Reyhanitabar:
Authenticated Encryption: Toward Next-Generation Algorithms. 70-72 - Marco M. Carvalho
, Richard Ford:
Moving-Target Defenses for Computer Networks. 73-76 - Michael Lesk:
Caller ID: Whose Privacy? 77-79 - Emiliano De Cristofaro:
Genomic Privacy and the Rise of a New Research Community. 80-83 - Bruce Schneier:
Metadata = Surveillance. 84
Volume 12, Number 3, May - June 2014
- Jeremy Epstein:
Phishing Our Employees. 3-4 - Lee Garber:
Security, Privacy, Policy, and Dependability Roundup. 6-8 - Gary McGraw:
Silver Bullet Talks with Yoshi Kohno. 9-12 - Terry Benzel:
A Symposium, a Magazine, and a Community. 13-14 - Peter G. Neumann, Sean Peisert
, Marvin Schaefer:
The IEEE Symposium on Security and Privacy, in Retrospect. 15-17 - George Cybenko, Kathy Clark-Fisher:
IEEE Security & Privacy: The Early Years. 18-19 - Michael Z. Lee, Alan M. Dunn, Jonathan Katz, Brent Waters, Emmett Witchel
:
Anon-Pass: Practical Anonymous Subscriptions. 20-27 - Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
On the Workings and Current Practices of Web-Based Device Fingerprinting. 28-36 - Joel Reardon, David A. Basin, Srdjan Capkun:
On Secure Data Deletion. 37-44 - Laszlo Szekeres, Mathias Payer, Tao Wei, R. Sekar:
Eternal War in Memory. 45-53 - Arthur Gervais, Ghassan O. Karame, Vedran Capkun, Srdjan Capkun:
Is Bitcoin a Decentralized Currency? 54-60 - Deirdre K. Mulligan:
The Enduring Importance of Transparency. 61-65 - Susan M. Landau:
Educating Engineers: Teaching Privacy in a World of Open Doors. 66-70 - Anna Slomovic:
Privacy Issues in Identity Verification. 71-73 - Milan Broz
, Vashek Matyas:
The TrueCrypt On-Disk Format-An Independent View. 74-77 - Michael Lesk:
Does the Cloud of Surveillance Have a Silver Lining? 78-81 - Christopher A. Bonebrake
, Lori Ross O'Neil
:
Attacks on GPS Time Reliability. 82-84 - Martin Ortlieb:
The Anthropologist's View on Privacy. 85-87 - Steven M. Bellovin:
Dr. Strangecode. 88
Volume 12, Number 4, July - August 2014
- Susan Landau:
Security and Privacy: Facing Ethical Choices. 3-6 - Lee Garber:
Security, Privacy, Policy, and Dependability Roundup. 8-10 - Gary McGraw:
Silver Bullet Talks with Nate Fick. 11-13 - Michael Kerr, Ron G. van Schyndel:
Adapting Law Enforcement Frameworks to Address the Ethical Problems of CCTV Product Propagation. 14-21 - Simson L. Garfinkel
, Michael McCarrin:
Can We Sniff Wi-Fi?: Implications of Joffe v. Google. 22-28 - Jan-Erik Ekberg, Kari Kostiainen, N. Asokan
:
The Untapped Potential of Trusted Execution Environments on Mobile Devices. 29-37 - Nir Kshetri:
China's Data Privacy Regulations: A Tricky Tradeoff between ICT's Productive Utilization and Cybercontrol. 38-45 - Daniel E. Geer Jr., Poul-Henning Kamp:
Inviting More Heartbleed. 46-50 - Robert Gellman:
Willis Ware's Lasting Contribution to Privacy: Fair Information Practices. 51-54 - Rebecca Balebako, Lorrie Faith Cranor
:
Improving App Privacy: Nudging App Developers to Protect User Privacy. 55-58 - Ari Juels, Thomas Ristenpart:
Honey Encryption: Encryption beyond the Brute-Force Barrier. 59-62 - Marco M. Carvalho
, Jared DeMott, Richard Ford, David A. Wheeler:
Heartbleed 101. 63-67 - Patrick D. McDaniel, Brian Rivera, Ananthram Swami:
Toward a Science of Secure Environments. 68-70 - Michael Lesk:
Staffing for Security: Don't Optimize. 71-73 - Shari Lawrence Pfleeger:
The Eyes Have It: Surveillance and How It Evolved. 74-79 - Steven M. Bellovin:
By Any Means Possible: How Intelligence Agencies Have Gotten Their Data. 80-84 - John DeLong:
Aligning the Compasses: A Journey through Compliance and Technology. 85-89 - Daniel E. Geer Jr.:
Personal Data and Government Surveillance. 90-96
Volume 12, Number 5, September - October 2014
- Shari Lawrence Pfleeger:
Expanding to Meet Readers' Needs. 3-4 - Gary McGraw:
Silver Bullet Talks with Bart Miller. 6-8 - Sean Peisert
, Jonathan Margulies, David M. Nicol, Himanshu Khurana, Chris Sawall:
Designed-in Security for Cyber-Physical Systems. 9-12 - Bill G. Horne:
On Computer Security Incident Response Teams. 13-15 - Robin Ruefle, Audrey J. Dorofee, David A. Mundie, Allen D. Householder, Michael Murray, Samuel J. Perl
:
Computer Security Incident Response Team Development and Evolution. 16-26 - Kas Clark, Don Stikvoort, Eelco Stofbergen, Elly van den Heuvel:
A Dutch Approach to Cybersecurity through Participation. 27-34 - Sandeep N. Bhatt, Pratyusa K. Manadhata, Loai Zomlot:
The Operational Role of Security Information and Event Management Systems. 35-41 - Panos Kampanakis:
Security Automation and Threat Information-Sharing Options. 42-51 - Sathya Chandran Sundaramurthy, John McHugh, Xinming Simon Ou, S. Raj Rajagopalan, Michael Wesch:
An Anthropological Approach to Studying CSIRTs. 52-60 - Tiffani R. Chen, Daniel B. Shore, Stephen J. Zaccaro, Reeshad S. Dalal, Lois E. Tetrick, Aiva K. Gorab:
An Organizational Psychology Perspective to Examining Computer Security Incident Response Teams. 61-67 - Yossi Gilad, Amir Herzberg
, Haya Schulmann:
Off-Path Hacking: The Illusion of Challenge-Response Authentication. 68-77 - Katrine Evans:
Where in the World Is My Information?: Giving People Access to Their Data. 78-81 - Cuong Manh Pham, Zachary Estrada, Phuong Cao
, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Building Reliable and Secure Virtual Machines Using Architectural Invariants. 82-85 - Jeffrey K. MacKie-Mason:
Can We Afford Privacy from Surveillance? 86-89 - Aaron Beuhring, Kyle Salous:
Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats. 90-93 - Bruce Schneier:
The Future of Incident Response. 96
Volume 12, Number 6, November - December 2014
- Shari Lawrence Pfleeger:
Technology, Transparency, and Trust. 3-5 - Gary McGraw:
Silver Bullet Talks with the IEEE Center for Secure Design. 9-12 - Sean Peisert
, Jonathan Margulies:
Closing the Gap on Securing Energy Sector Control Systems [Guest editors' introduction]. 13-14 - Carlos A. Barreto
, Jairo Alonso Giraldo, Alvaro A. Cárdenas, Eduardo Mojica-Nava
, Nicanor Quijano
:
Control Systems for the Power Grid and Their Resiliency to Attacks. 15-23 - Moses Schwartz, John Mulder, Adrian R. Chavez, Benjamin A. Allan:
Emerging Techniques for Field Device Security. 24-31 - Chuck McParland, Sean Peisert
, Anna Scaglione
:
Monitoring Security of Networked Control Systems: It's the Physics. 32-39 - Saman A. Zonouz, Julian L. Rrushi, Stephen E. McLaughlin:
Detecting Industrial Control Malware Using Automated PLC Code Analytics. 40-47 - Ryan Ellis:
Regulating Cybersecurity: Institutional Learning or a Lesson in Futility? 48-54 - Sean Peisert
, Jonathan Margulies, Eric Byres, Paul Dorey, Dale Peterson, Zach Tudor:
Control Systems Security from the Front Lines. 55-58 - Francien Dechesne
, Dina Hadziosmanovic, Wolter Pieters:
Experimenting with Incentives: Security in Pilots for Future Grids. 59-66 - Jungwoo Ryoo
, Syed Rizvi, William Aiken, John Kissell:
Cloud Security Auditing: Challenges and Emerging Approaches. 68-74 - Frank Kargl, Rens W. van der Heijden
, Hartmut König, Alfonso Valdes, Marc Dacier
:
Insights on the Security and Dependability of Industrial Control Systems. 75-78 - Melissa Dark:
Advancing Cybersecurity Education. 79-83 - Wendy M. Grossman
:
"Emergency" Ushers in a New Era in British Communications Surveillance. 84-88 - Lorrie Faith Cranor
, Norbou Buchler:
Better Together: Usability and Security Go Hand in Hand. 89-93 - Michael Lesk:
Trust, but Verify. 94-96 - Todd Bauer, Jason R. Hamlet:
Physical Unclonable Functions: A Primer. 97-101 - Benjamin Edelman:
Accountable? The Problems and Solutions of Online Ad Optimization. 102-107 - Steven M. Bellovin:
What Should Crypto Look Like? 108

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.