


default search action
IEEE Security & Privacy, Volume 16
Volume 16, Number 1, January / February 2018
- Gary McGraw:

Silver Bullet Talks with Wafaa Mamilli. 6-9 - Terry Benzel, Sean Peisert

:
Selected Papers from the 2017 IEEE Symposium on Security and Privacy. 10-11 - Cormac Herley, Paul C. van Oorschot

:
Science of Security: Combining Theory and Measurement to Reflect the Observable. 12-22 - Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson:

Toward Continual Measurement of Global Network-Level Censorship. 24-33 - Mathias Lécuyer, Riley Spahn, Roxana Geambasu, Tzu-Kuo Huang, Siddhartha Sen:

Enhancing Selectivity in Big Data. 34-42 - Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:

Arya: Operating System Support for Securely Augmenting Reality. 44-53 - Eyal Ronen, Adi Shamir, Achi-Or Weingarten, Colin O'Flynn:

IoT Goes Nuclear: Creating a Zigbee Chain Reaction. 54-62 - Primal Wijesekera

, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman
, David A. Wagner, Konstantin Beznosov:
Dynamically Regulating Mobile Application Permissions. 64-71 - Feng Hao

, Dylan Clarke, Brian Randell, Siamak F. Shahandashti:
Verifiable Classroom Voting in Practice. 72-81 - Rick Hofstede, Aiko Pras, Anna Sperotto, Gabi Dreo Rodosek:

Flow-Based Compromise Detection: Lessons Learned. 82-89 - Massimiliano Albanese

, Sushil Jajodia
, Sridhar Venkatesan:
Defending from Stealthy Botnets Using Moving Target Defenses. 92-97 - Siddharth Kaza, Blair Taylor, Kyle Sherbert:

Hello, World! - Code Responsibly. 98-100 - Aisling Connolly

:
Freedom of Encryption. 102-103 - Daniel E. Geer Jr.:

Trading Places. 104
Volume 16, Number 2, March / April 2018
- Gary McGraw:

Silver Bullet Talks with Craig Froelich. 6-8 - Timothy Vidas, Per Larsen, Hamed Okhravi

, Ahmad-Reza Sadeghi:
Changing the Game of Software Security. 10-11 - Yan Shoshitaishvili, Antonio Bianchi, Kevin Borgolte, Amat Cama, Jacopo Corbetta, Francesco Disperati, Andrew Dutcher, John Grosen, Paul Grosen, Aravind Machiry, Christopher Salls, Nick Stephens, Ruoyu Wang, Giovanni Vigna:

Mechanical Phish: Resilient Autonomous Hacking. 12-22 - Benjamin Price, Michael Zhivich, Michael Thompson, Chris Eagle:

House Rules: Designing the Scoring Algorithm for Cyber Grand Challenge. 23-31 - Timothy Bryant, Shaun Davenport:

A Honeybug for Automated Cyber Reasoning Systems. 32-36 - Michael F. Thompson:

Effects of a Honeypot on the Cyber Grand Challenge Final Event. 37-41 - Anh Nguyen-Tuong, David Melski, Jack W. Davidson, Michele Co, William Hawkins, Jason D. Hiser, Derek Morris, Ducson Nguyen, Eric F. Rizzi:

Xandra: An Autonomous Cyber Battle System for the Cyber Grand Challenge. 42-51 - Thanassis Avgerinos, David Brumley

, John Davis, Ryan Goulden, Tyler Nighswander, Alexandre Rebert, Ned Williamson:
The Mayhem Cyber Reasoning System. 52-60 - Peter Goodman

, Artem Dinaburg:
The Past, Present, and Future of Cyberdyne. 61-69 - Peter Blank, Sabrina Kirrane

, Sarah Spiekermann:
Privacy-Aware Restricted Areas for Unmanned Aerial Systems. 70-79 - Cliff Wang, Zhuo Lu:

Cyber Deception: Overview and the Road Ahead. 80-85 - Pamela J. Wisniewski

:
The Privacy Paradox of Adolescent Online Safety: A Matter of Risk Prevention or Risk Resilience? 86-90 - Michael F. Thompson, Cynthia E. Irvine:

Individualizing Cybersecurity Lab Exercises with Labtainers. 91-95 - Bruce Schneier:

Artificial Intelligence and the Attack/Defense Balance. 96
Volume 16, Number 3, May / June 2018
- John D. McLean, Cormac Herley, Paul C. van Oorschot:

Letter to the Editor. 6-10 - Gary McGraw:

Silver Bullet Talks with Bruce Potter. 12-14 - Omer Tene, Jules Polonetsky, Ahmad-Reza Sadeghi:

Five Freedoms for the Homo Deus. 15-17 - Robert H. Sloan

, Richard Warner:
When Is an Algorithm Transparent? Predictive Analytics, Privacy, and Public Policy. 18-25 - Bernd Carsten Stahl, David Wright:

Ethics and Privacy in AI and Big Data: Implementing Responsible Research and Innovation. 26-33 - Micah Altman

, Alexandra Wood
, Effy Vayena:
A Harm-Reduction Framework for Algorithmic Fairness. 34-45 - Lilian Edwards, Michael Veale

:
Enslaving the Algorithm: From a "Right to an Explanation" to a "Right to Better Decisions"? 46-54 - Dawn E. Schrader, Dipayan P. Ghosh:

Proactively Protecting Against the Singularity: Ethical Decision Making in AI. 56-63 - Meg Leta Jones, Ellen Kaufman, Elizabeth Edenberg:

AI and the Ethics of Automating Consent. 64-72 - Reuben Binns:

What Can Political Philosophy Teach Us about Algorithmic Fairness? 73-80 - Jian Liu, Wenting Li

, Ghassan O. Karame, N. Asokan:
Toward Fairness of Cryptocurrency Payments. 81-89 - Michael Franz:

Making Multivariant Programming Practical and Inexpensive. 90-94 - Awais Rashid

, George Danezis, Howard Chivers, Emil Lupu, Andrew Martin
, Makayla Lewis, Claudia Peersman:
Scoping the Cyber Security Body of Knowledge. 96-102 - Amin Kharraz

, William K. Robertson, Engin Kirda:
Protecting against Ransomware: A New Line of Research or Restating Classic Ideas? 103-107 - Steven M. Bellovin:

Toward a National Cybersecurity Policy. 108
Volume 16, Number 4, July / August 2018
- Gary McGraw:

Silver Bullet Talks with Nick Weaver. 7-10 - Ghassan Karame, Srdjan Capkun:

Blockchain Security and Privacy. 11-12 - Sarah Meiklejohn:

Top Ten Obstacles along Distributed Ledgers Path to Adoption. 13-19 - Paul Dunphy, Fabien A. P. Petitcolas

:
A First Look at Identity Management Schemes on the Blockchain. 20-29 - Lin Chen

, Lei Xu
, Zhimin Gao, Yang Lu, Weidong Shi:
Tyranny of the Majority: On the (Im)possibility of Correctness of Smart Contracts. 30-37 - Ryan Henry, Amir Herzberg, Aniket Kate:

Blockchain Access Privacy: Challenges and Directions. 38-45 - Ilias Giechaskiel

, Cas Cremers, Kasper Bonne Rasmussen:
When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives. 46-56 - Rachid El Bansarkhani, Matthias Geihs, Johannes Buchmann:

PQChain: Strategic Design Decisions for Distributed Ledger Technologies against Future Threats. 57-65 - Raffaello Perrotta, Feng Hao

:
Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions. 66-81 - Yang Wang:

Inclusive Security and Privacy. 82-87 - Irfan Ahmed

, Vassil Roussev:
Peer Instruction Teaching Methodology for Cybersecurity Education. 88-91 - Giannis Tziakouris:

Cryptocurrencies - A Forensic Challenge or Opportunity for Law Enforcement? An INTERPOL Perspective. 92-94 - Daniel E. Geer Jr.:

You Are What You Eat. 96
Volume 16, Number 5, September / October 2018
- Gary McGraw:

Silver Bullet Talks with Tanya Janca. 7-11 - Johannes Buchmann, Kristin E. Lauter, Michele Mosca:

Postquantum Cryptography, Part 2. 12-13 - Stephen P. Jordan, Yi-Kai Liu:

Quantum Cryptanalysis: Shor, Grover, and Beyond. 14-21 - Martin Roetteler

, Krysta M. Svore:
Quantum Computing: Codebreaking and Beyond. 22-36 - Michele Mosca:

Cybersecurity in an Era with Quantum Computers: Will We Be Ready? 38-41 - Masahide Sasaki:

Quantum Key Distribution and Its Applications. 42-48 - Qinchen Gu, David Formby, Shouling Ji, Hasan Cam, Raheem A. Beyah

:
Fingerprinting for Cyber-Physical System Security: Device Physics Matters Too. 49-59 - Diego Kreutz

, Jiangshan Yu
, Paulo Jorge Esteves Veríssimo, Catia Magalhaes, Fernando M. V. Ramos
:
The KISS Principle in Software-Defined Networking: A Framework for Secure Communications. 60-70 - Stephanie Winkler, Sherali Zeadally, Katrine Evans:

Privacy and Civilian Drone Use: The Need for Further Regulation. 72-80 - Elizabeth Stobert, Elizabeta Cavar, Luka Malisa, David M. Sommer:

Teaching Authentication as a Life Skill. 82-85 - Bruce Schneier:

Cryptography after the Aliens Land. 86-88
Volume 16, Number 6, November - December 2018
- Gary McGraw:

Silver Bullet Talks With Kathleen Fisher [Interview]. 4-9 - Daniela Seabra Oliveira

, Jeremy Epstein, James F. Kurose, Anderson Rocha
:
Cybersecurity and Privacy Issues in Brazil: Back, Now, and Then [Guest Editors' Introduction]. 10-12 - Marinho P. Barcellos

, Diego F. Aranha
:
Research in Security and Privacy in Brazil. 14-21 - Diego F. Aranha

, Jeroen van de Graaf:
The Good, the Bad, and the Ugly: Two Decades of E-Voting in Brazil. 22-30 - Fabricio Ceschin

, Felipe Azevedo Pinage, Marcos A. Castilho, David Menotti, Luiz S. Oliveira, Andre Gregio
:
The Need for Speed: An Analysis of Brazilian Malware Classifers. 31-41 - Paulo Matias

, Pedro Barbosa, Thiago N. C. Cardoso, Diego M. Campos, Diego F. Aranha
:
NIZKCTF: A Noninteractive Zero-Knowledge Capture-the-Flag Platform. 42-51 - Paulo Silva

, Tânia Basso, Nuno Antunes
, Regina Moraes
, Marco Vieira
, Paulo Simões, Edmundo Monteiro
:
A Europe-Brazil Context for Secure Data Analytics in the Cloud. 52-60 - Joshua A. Kroll

:
Data Science Data Governance [AI Ethics]. 61-70 - Xiaoyan Sun, Peng Liu, Anoop Singhal:

Toward Cyberresiliency in the Context of Cloud Computing [Resilient Security]. 71-75 - Bruce Schneier:

Unnoticed Consent [Last Word]. 80-79

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














