default search action
IEEE Security & Privacy, Volume 16
Volume 16, Number 1, January / February 2018
- Gary McGraw:
Silver Bullet Talks with Wafaa Mamilli. 6-9 - Terry Benzel, Sean Peisert:
Selected Papers from the 2017 IEEE Symposium on Security and Privacy. 10-11 - Cormac Herley, Paul C. van Oorschot:
Science of Security: Combining Theory and Measurement to Reflect the Observable. 12-22 - Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson:
Toward Continual Measurement of Global Network-Level Censorship. 24-33 - Mathias Lécuyer, Riley Spahn, Roxana Geambasu, Tzu-Kuo Huang, Siddhartha Sen:
Enhancing Selectivity in Big Data. 34-42 - Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Arya: Operating System Support for Securely Augmenting Reality. 44-53 - Eyal Ronen, Adi Shamir, Achi-Or Weingarten, Colin O'Flynn:
IoT Goes Nuclear: Creating a Zigbee Chain Reaction. 54-62 - Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David A. Wagner, Konstantin Beznosov:
Dynamically Regulating Mobile Application Permissions. 64-71 - Feng Hao, Dylan Clarke, Brian Randell, Siamak F. Shahandashti:
Verifiable Classroom Voting in Practice. 72-81 - Rick Hofstede, Aiko Pras, Anna Sperotto, Gabi Dreo Rodosek:
Flow-Based Compromise Detection: Lessons Learned. 82-89 - Massimiliano Albanese, Sushil Jajodia, Sridhar Venkatesan:
Defending from Stealthy Botnets Using Moving Target Defenses. 92-97 - Siddharth Kaza, Blair Taylor, Kyle Sherbert:
Hello, World! - Code Responsibly. 98-100 - Aisling Connolly:
Freedom of Encryption. 102-103 - Daniel E. Geer Jr.:
Trading Places. 104
Volume 16, Number 2, March / April 2018
- Gary McGraw:
Silver Bullet Talks with Craig Froelich. 6-8 - Timothy Vidas, Per Larsen, Hamed Okhravi, Ahmad-Reza Sadeghi:
Changing the Game of Software Security. 10-11 - Yan Shoshitaishvili, Antonio Bianchi, Kevin Borgolte, Amat Cama, Jacopo Corbetta, Francesco Disperati, Andrew Dutcher, John Grosen, Paul Grosen, Aravind Machiry, Christopher Salls, Nick Stephens, Ruoyu Wang, Giovanni Vigna:
Mechanical Phish: Resilient Autonomous Hacking. 12-22 - Benjamin Price, Michael Zhivich, Michael Thompson, Chris Eagle:
House Rules: Designing the Scoring Algorithm for Cyber Grand Challenge. 23-31 - Timothy Bryant, Shaun Davenport:
A Honeybug for Automated Cyber Reasoning Systems. 32-36 - Michael F. Thompson:
Effects of a Honeypot on the Cyber Grand Challenge Final Event. 37-41 - Anh Nguyen-Tuong, David Melski, Jack W. Davidson, Michele Co, William H. Hawkins, Jason D. Hiser, Derek Morris, Ducson Nguyen, Eric F. Rizzi:
Xandra: An Autonomous Cyber Battle System for the Cyber Grand Challenge. 42-51 - Thanassis Avgerinos, David Brumley, John Davis, Ryan Goulden, Tyler Nighswander, Alexandre Rebert, Ned Williamson:
The Mayhem Cyber Reasoning System. 52-60 - Peter Goodman, Artem Dinaburg:
The Past, Present, and Future of Cyberdyne. 61-69 - Peter Blank, Sabrina Kirrane, Sarah Spiekermann:
Privacy-Aware Restricted Areas for Unmanned Aerial Systems. 70-79 - Cliff Wang, Zhuo Lu:
Cyber Deception: Overview and the Road Ahead. 80-85 - Pamela J. Wisniewski:
The Privacy Paradox of Adolescent Online Safety: A Matter of Risk Prevention or Risk Resilience? 86-90 - Michael F. Thompson, Cynthia E. Irvine:
Individualizing Cybersecurity Lab Exercises with Labtainers. 91-95 - Bruce Schneier:
Artificial Intelligence and the Attack/Defense Balance. 96
Volume 16, Number 3, May / June 2018
- John D. McLean, Cormac Herley, Paul C. van Oorschot:
Letter to the Editor. 6-10 - Gary McGraw:
Silver Bullet Talks with Bruce Potter. 12-14 - Omer Tene, Jules Polonetsky, Ahmad-Reza Sadeghi:
Five Freedoms for the Homo Deus. 15-17 - Robert H. Sloan, Richard Warner:
When Is an Algorithm Transparent? Predictive Analytics, Privacy, and Public Policy. 18-25 - Bernd Carsten Stahl, David Wright:
Ethics and Privacy in AI and Big Data: Implementing Responsible Research and Innovation. 26-33 - Micah Altman, Alexandra Wood, Effy Vayena:
A Harm-Reduction Framework for Algorithmic Fairness. 34-45 - Lilian Edwards, Michael Veale:
Enslaving the Algorithm: From a "Right to an Explanation" to a "Right to Better Decisions"? 46-54 - Dawn E. Schrader, Dipayan P. Ghosh:
Proactively Protecting Against the Singularity: Ethical Decision Making in AI. 56-63 - Meg Leta Jones, Ellen Kaufman, Elizabeth Edenberg:
AI and the Ethics of Automating Consent. 64-72 - Reuben Binns:
What Can Political Philosophy Teach Us about Algorithmic Fairness? 73-80 - Jian Liu, Wenting Li, Ghassan O. Karame, N. Asokan:
Toward Fairness of Cryptocurrency Payments. 81-89 - Michael Franz:
Making Multivariant Programming Practical and Inexpensive. 90-94 - Awais Rashid, George Danezis, Howard Chivers, Emil Lupu, Andrew Martin, Makayla Lewis, Claudia Peersman:
Scoping the Cyber Security Body of Knowledge. 96-102 - Amin Kharraz, William K. Robertson, Engin Kirda:
Protecting against Ransomware: A New Line of Research or Restating Classic Ideas? 103-107 - Steven M. Bellovin:
Toward a National Cybersecurity Policy. 108
Volume 16, Number 4, July / August 2018
- Gary McGraw:
Silver Bullet Talks with Nick Weaver. 7-10 - Ghassan Karame, Srdjan Capkun:
Blockchain Security and Privacy. 11-12 - Sarah Meiklejohn:
Top Ten Obstacles along Distributed Ledgers Path to Adoption. 13-19 - Paul Dunphy, Fabien A. P. Petitcolas:
A First Look at Identity Management Schemes on the Blockchain. 20-29 - Lin Chen, Lei Xu, Zhimin Gao, Yang Lu, Weidong Shi:
Tyranny of the Majority: On the (Im)possibility of Correctness of Smart Contracts. 30-37 - Ryan Henry, Amir Herzberg, Aniket Kate:
Blockchain Access Privacy: Challenges and Directions. 38-45 - Ilias Giechaskiel, Cas Cremers, Kasper Bonne Rasmussen:
When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives. 46-56 - Rachid El Bansarkhani, Matthias Geihs, Johannes Buchmann:
PQChain: Strategic Design Decisions for Distributed Ledger Technologies against Future Threats. 57-65 - Raffaello Perrotta, Feng Hao:
Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions. 66-81 - Yang Wang:
Inclusive Security and Privacy. 82-87 - Irfan Ahmed, Vassil Roussev:
Peer Instruction Teaching Methodology for Cybersecurity Education. 88-91 - Giannis Tziakouris:
Cryptocurrencies - A Forensic Challenge or Opportunity for Law Enforcement? An INTERPOL Perspective. 92-94 - Daniel E. Geer Jr.:
You Are What You Eat. 96
Volume 16, Number 5, September / October 2018
- Gary McGraw:
Silver Bullet Talks with Tanya Janca. 7-11 - Johannes Buchmann, Kristin E. Lauter, Michele Mosca:
Postquantum Cryptography, Part 2. 12-13 - Stephen P. Jordan, Yi-Kai Liu:
Quantum Cryptanalysis: Shor, Grover, and Beyond. 14-21 - Martin Roetteler, Krysta M. Svore:
Quantum Computing: Codebreaking and Beyond. 22-36 - Michele Mosca:
Cybersecurity in an Era with Quantum Computers: Will We Be Ready? 38-41 - Masahide Sasaki:
Quantum Key Distribution and Its Applications. 42-48 - Qinchen Gu, David Formby, Shouling Ji, Hasan Cam, Raheem A. Beyah:
Fingerprinting for Cyber-Physical System Security: Device Physics Matters Too. 49-59 - Diego Kreutz, Jiangshan Yu, Paulo Jorge Esteves Veríssimo, Catia Magalhaes, Fernando M. V. Ramos:
The KISS Principle in Software-Defined Networking: A Framework for Secure Communications. 60-70 - Stephanie Winkler, Sherali Zeadally, Katrine Evans:
Privacy and Civilian Drone Use: The Need for Further Regulation. 72-80 - Elizabeth Stobert, Elizabeta Cavar, Luka Malisa, David M. Sommer:
Teaching Authentication as a Life Skill. 82-85 - Bruce Schneier:
Cryptography after the Aliens Land. 86-88
Volume 16, Number 6, November - December 2018
- Gary McGraw:
Silver Bullet Talks With Kathleen Fisher [Interview]. 4-9 - Daniela Seabra Oliveira, Jeremy Epstein, James F. Kurose, Anderson Rocha:
Cybersecurity and Privacy Issues in Brazil: Back, Now, and Then [Guest Editors' Introduction]. 10-12 - Marinho P. Barcellos, Diego F. Aranha:
Research in Security and Privacy in Brazil. 14-21 - Diego F. Aranha, Jeroen van de Graaf:
The Good, the Bad, and the Ugly: Two Decades of E-Voting in Brazil. 22-30 - Fabricio Ceschin, Felipe Azevedo Pinage, Marcos A. Castilho, David Menotti, Luiz S. Oliveira, Andre Gregio:
The Need for Speed: An Analysis of Brazilian Malware Classifers. 31-41 - Paulo Matias, Pedro Barbosa, Thiago N. C. Cardoso, Diego M. Campos, Diego F. Aranha:
NIZKCTF: A Noninteractive Zero-Knowledge Capture-the-Flag Platform. 42-51 - Paulo Silva, Tânia Basso, Nuno Antunes, Regina Moraes, Marco Vieira, Paulo Simões, Edmundo Monteiro:
A Europe-Brazil Context for Secure Data Analytics in the Cloud. 52-60 - Joshua A. Kroll:
Data Science Data Governance [AI Ethics]. 61-70 - Xiaoyan Sun, Peng Liu, Anoop Singhal:
Toward Cyberresiliency in the Context of Cloud Computing [Resilient Security]. 71-75 - Bruce Schneier:
Unnoticed Consent [Last Word]. 80-79
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.