


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 46 matches
- 2023
- Fabio Massacci
, Laurie A. Williams:
Software Supply Chain Security [Guest Editors' Introduction]. IEEE Secur. Priv. 21(6): 8-10 (2023) - 2022
- Srini Devadas, Jeyavijayan Rajendran
:
Guest Editors' Introduction: Special Issue on 2021 Top Picks in Hardware and Embedded Security. IEEE Des. Test 39(4): 5-6 (2022) - Rémi Badonnel
, Carol J. Fung, Sandra Scott-Hayward, Qi Li, Fulvio Valenza
, Cristian Hesselman:
Guest Editors Introduction: Special Section on Recent Advances in Network Security Management. IEEE Trans. Netw. Serv. Manag. 19(3): 2251-2254 (2022) - 2021
- Rosario Cammarota, Francesco Regazzoni
:
Guest Editors' Introduction: Special Issue on Top Picks in Hardware and Embedded Security. IEEE Des. Test 38(3): 5-6 (2021) - Sabah Mohammed, Tai-Hoon Kim, Wai-Chi Fang:
Requirements for Security, Privacy, and Trust in the Internet of Things [Guest Editors' Introduction]. IEEE Secur. Priv. 19(1): 8-10 (2021) - Rémi Badonnel
, Carol J. Fung, Sandra Scott-Hayward, Qi Li, Jie Zhang, Cristian Hesselman:
Guest Editors' Introduction: Special Issue on Latest Developments for Security Management of Networks and Services. IEEE Trans. Netw. Serv. Manag. 18(2): 1120-1124 (2021) - 2020
- Amro Awad
, Rujia Wang
:
Guest Editors' Introduction to the Special Issue on Hardware Security. IEEE Trans. Computers 69(11): 1556-1557 (2020) - 2019
- Gail-Joon Ahn
, Guofei Gu, Hongxin Hu
, Seungwon Shin
:
Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies. IEEE Trans. Dependable Secur. Comput. 16(6): 913-914 (2019) - 2018
- Domenico Cotroneo
, Karthik Pattabiraman
, Antonio Pecchia:
Guest Editors' Introduction: Special Issue on Data-Driven Dependability and Security. IEEE Trans. Dependable Secur. Comput. 15(6): 913-914 (2018) - Rainer Böhme, Richard Clayton, Jens Grossklags, Katrina Ligett
, Patrick Loiseau, Galina Schwartz:
Special Issue on the Economics of Security and Privacy: Guest Editors' Introduction. ACM Trans. Internet Techn. 18(4): 47:1-47:3 (2018) - 2017
- Michail Maniatakos
, Alvaro A. Cárdenas, Ramesh Karri
:
Guest Editors' Introduction: Cyber-Physical Systems Security and Privacy. IEEE Des. Test 34(4): 5-6 (2017) - Swarup Bhunia
, An Chen, Ozgur Sinanoglu
, Jason M. Fung:
Guest Editors Introduction: Security of Beyond CMOS Devices: Issues and Opportunities. IEEE Trans. Emerg. Top. Comput. 5(3): 302-303 (2017) - 2016
- Domenic Forte
, Ron Perez, Yongdae Kim
, Swarup Bhunia
:
Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]. Computer 49(8): 12-16 (2016) - M. Angela Sasse, Matthew Smith
:
The Security-Usability Tradeoff Myth [Guest editors' introduction]. IEEE Secur. Priv. 14(5): 11-13 (2016) - Alvaro A. Cárdenas, Bruno Crispo:
Cyber-Physical Security and Privacy [Guest editors' introduction]. IEEE Internet Comput. 20(5): 6-8 (2016) - 2015
- Jeffrey R. Yost:
Computer Security [Guest editors' introduction]. IEEE Ann. Hist. Comput. 37(2): 6-7 (2015) - J. Morris Chang, Rick Kuhn, Timothy R. Weil:
IT Security [Guest editors' introduction]. IT Prof. 17(1): 14-15 (2015) - Sunny Consolvo, Jason I. Hong
, Marc Langheinrich
:
Privacy and Security [Guest editors' introduction]. IEEE Pervasive Comput. 14(1): 16-17 (2015) - Tyrone Grandison
, Larry Koved:
Security and Privacy on the Web [Guest editors' introduction]. IEEE Softw. 32(4): 36-39 (2015) - 2014
- Zhenfu Cao
, Keqiu Li, Xu Li, Patrick D. McDaniel, Radha Poovendran
, Guojun Wang, Yang Xiang
:
Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems. IEEE Trans. Parallel Distributed Syst. 25(2): 279-282 (2014) - 2012
- Christos Dimitrakakis
, Tom Karygiannis, Aikaterini Mitrokotsa
:
Guest Editors' Introduction: Special Section on Learning, Games, and Security. IEEE Trans. Dependable Secur. Comput. 9(4): 449-450 (2012) - Elena Ferrari
, Bhavani Thuraisingham:
Guest Editors' Introduction: Special Section on Data and Applications Security and Privacy. IEEE Trans. Dependable Secur. Comput. 9(5): 625-626 (2012) - 2011
- Nicolas Sklavos
, Sherali Zeadally, Cristina Alcaraz
:
Guest Editors' Introduction to the Special Issue on "Modern trends in applied security: Architectures, implementations and applications". Comput. Electr. Eng. 37(2): 127-128 (2011) - David Evans, Salvatore J. Stolfo:
Guest Editors' Introduction: The Science of Security. IEEE Secur. Priv. 9(3): 16-17 (2011) - Mary Frances Theofanos, Shari Lawrence Pfleeger:
Guest Editors' Introduction: Shouldn't All Security Be Usable? IEEE Secur. Priv. 9(2): 12-17 (2011) - 2010
- John Viega, Bret Michael:
Guest Editors' Introduction: Mobile Device Security. IEEE Secur. Priv. 8(2): 11-12 (2010) - 2009
- Gary McGraw, Ming Chow:
Guest Editors' Introduction: Securing Online Games: Safeguarding the Future of Software Security. IEEE Secur. Priv. 7(3): 11-12 (2009) - Patrick Schaumont
, Alex K. Jones
, Steve Trimberger:
Guest Editors' Introduction to Security in Reconfigurable Systems Design. ACM Trans. Reconfigurable Technol. Syst. 2(1): 1:1-1:6 (2009) - 2008
- Daniel Dajun Zeng, Hsinchun Chen, Fei-Yue Wang, Hillol Kargupta:
Guest Editors' Introduction: Special Section on Intelligence and Security Informatics. IEEE Trans. Knowl. Data Eng. 20(8): 1009-1012 (2008) - 2007
- Paris Kitsos
, Nicolas Sklavos
:
Guest Editors' Introduction to the Special Issue on Security of Computers and Networks. Comput. Electr. Eng. 33(5-6): 321-323 (2007)
skipping 16 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-02-16 02:57 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint