IEEE Security & Privacy

Papers
(The median citation count of IEEE Security & Privacy is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
A Taxonomy of Attacks on Federated Learning115
Perspectives on the SolarWinds Incident45
Top Five Challenges in Software Supply Chain Security: Observations From 30 Industry and Government Organizations33
A Critical Overview of Privacy in Machine Learning31
Understanding the Security Implications of Kubernetes Networking21
Zero Trust Architecture: Does It Help?21
Privacy Regulations, Smart Roads, Blockchain, and Liability Insurance: Putting Technologies to Work19
Challenges and Opportunities in Cyberphysical Systems Security: A Physics-Based Perspective19
Data Privacy and Trustworthy Machine Learning18
Privacy in the Time of COVID-19: Divergent Paths for Contact Tracing and Route-Disclosure Mechanisms in South Korea18
Software Bills of Materials Are Required. Are We There Yet?17
Time to Change the CVSS?17
Security and Privacy in Internet of Things-Enabled Smart Cities: Challenges and Future Directions17
An Informative Security and Privacy “Nutrition” Label for Internet of Things Devices17
Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols16
Are We Preparing Students to Build Security In? A Survey of European Cybersecurity in Higher Education Programs [Education]16
Dealing With COVID-19 Network Traffic Spikes [Cybercrime and Forensics]15
Never Mind the Malware, Here’s the Stegomalware15
Phishing Detection Leveraging Machine Learning and Deep Learning: A Review13
Beyond Passwords—Challenges and Opportunities of Future Authentication13
SolarWinds and the Challenges of Patching: Can We Ever Stop Dancing With the Devil?13
Threat Modeling Tools: A Taxonomy12
Verify It’s You: How Users Perceive Risk-Based Authentication12
Different Kind of Smells: Security Smells in Infrastructure as Code Scripts12
Machine Learning for Source Code Vulnerability Detection: What Works and What Isn’t There Yet11
Cyberassured Systems Engineering at Scale11
Toward Cybersecurity Personalization in Smart Homes11
Security Verification of the OpenTitan Hardware Root of Trust10
Secure Messaging Authentication Ceremonies Are Broken10
Challenges in Cryptography9
Attacks on Artificial Intelligence [Last Word]9
Backdoors Against Natural Language Processing: A Review9
Embedding Privacy Into Design Through Software Developers: Challenges and Solutions9
The Ransomware Threat to Energy-Delivery Systems9
Parental Controls: Safer Internet Solutions or New Pitfalls?8
The State of the Art in Integer Factoring and Breaking Public-Key Cryptography8
Detecting Spying Drones8
Equity and Privacy: More Than Just a Tradeoff8
Privacy for the People? Exploring Collective Action as a Mechanism to Shift Power to Consumers in End-User Privacy7
Certificate Transparency in Google Chrome: Past, Present, and Future7
Privacy in a Time of COVID-19: How Concerned Are You?7
A Real-Time Cosimulation Testbed for Electric Vehicle Charging and Smart Grid Security7
Online Log Data Analysis With Efficient Machine Learning: A Review7
Privacy-Preserving and Sustainable Contact Tracing Using Batteryless Bluetooth Low-Energy Beacons6
Sphynx: A Deep Neural Network Design for Private Inference6
Medical Device Forensics6
The Challenges of Software Cybersecurity Certification [Building Security In]6
End-to-End Security: When Do We Have It?6
Dispelling Misconceptions and Characterizing the Failings of Deepfake Detection6
Disinformation and Reflections From Usable Security6
Complex Encoded Tile Tensors: Accelerating Encrypted Analytics6
A Decade of Reoccurring Software Weaknesses6
Security for Shared Electric and Automated Mobility Services in Smart Cities5
The United Kingdom’s Cyber Security Degree Certification Program: A Cyber Security Body of Knowledge Case Study5
Electric Sheep on the Pastures of Disinformation and Targeted Phishing Campaigns: The Security Implications of ChatGPT5
Challenges and Opportunities for Beyond-5G Wireless Security5
Seven Pain Points of Threat Analysis and Risk Assessment in the Automotive Domain5
Computing on Encrypted Data5
Privacy Compliance: Can Technology Come to the Rescue?5
Challenges of Producing Software Bill of Materials for Java5
Credit Card Fraud Is a Computer Security Problem5
Are Machine Learning Models for Malware Detection Ready for Prime Time?5
Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures5
The Advanced Encryption Standard: 20 Years Later5
Citizens’ Cybersecurity Behavior: Some Major Challenges5
Toward Hardware Security Property Generation at Scale5
OpenSSF Scorecard: On the Path Toward Ecosystem-Wide Automated Security Metrics5
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware5
Nudging Software Developers Toward Secure Code5
Rectification of Syntactic and Semantic Privacy Mechanisms4
Automated Privacy Preferences for Smart Home Data Sharing Using Personal Data Stores4
Whack-a-Meltdown: Microarchitectural Security Games [Systems Attacks and Defenses]4
Is Vulnerability Report Confidence Redundant? Pitfalls Using Temporal Risk Scores4
“Free” as in Freedom to Protest?4
Integrating Cybersecurity and Artificial Intelligence Research in Engineering and Computer Science Education4
Exploring the Shift in Security Responsibility4
Technical Leverage: Dependencies Are a Mixed Blessing4
Problematic Privacy Policies of Voice Assistant Applications4
Lessons Learned on Machine Learning for Computer Security4
Wake Up Digital Forensics’ Community and Help Combat Ransomware4
Trusting Trust: Humans in the Software Supply Chain Loop4
Action Bias and the Two Most Dangerous Words in Cybersecurity Incident Response: An Argument for More Measured Incident Response3
Current Perspectives on Securing Critical Infrastructures’ Supply Chains3
What We Have Here Is Failure to Validate: Summer of LangSec3
Reconfigurable Digital Twin to Support Research, Education, and Training in the Defense of Critical Infrastructure3
The Seven Golden Principles of Effective Anomaly-Based Intrusion Detection3
End-to-End Verifiable E-Voting Trial for Polling Station Voting3
Contextual Integrity, Explained: A More Usable Privacy Definition3
Privacy in the Era of 5G, IoT, Big Data, and Machine Learning3
Security and Privacy for Edge Artificial Intelligence3
Online Attack Recovery in Cyberphysical Systems3
A Cybersecurity Moonshot3
Decentralized Public-Key Infrastructure With Blockchain in V2X Communications: Promising or Only Euphoria?3
(In)secure Smart Device Use Among Senior Citizens3
Machine Learning Security and Privacy3
A Self-Healing Mechanism for Internet of Things Devices3
Demystifying Android’s Scoped Storage Defense3
The Data Protection Officer: A Ubiquitous Role That No One Really Knows3
Distributed Self-Sovereign-Based Access Control System3
Forensic Event Analysis: From Seemingly Unrelated Data to Understanding3
Security Issues in Situational Awareness: Adversarial Threats and Mitigation Techniques3
Cybersecurity Advocates: Force Multipliers in Security Behavior Change3
Supporting Artificial Intelligence/Machine Learning Security Workers Through an Adversarial Techniques, Tools, and Common Knowledge Framework2
What Will It Take?2
Developing With Formal Methods at BedRock Systems, Inc.2
Modeling Large-Scale Manipulation in Open Stock Markets2
Journey to the Center of Software Supply Chain Attacks2
Opportunities and Challenges in Securing Critical Infrastructures Through Cryptography2
Memory Protection Keys: Facts, Key Extension Perspectives, and Discussions2
Courseware as Code: Instituting Agile Courseware Collaboration2
Usable Security and Privacy for Security and Privacy Workers2
Preserving Privacy in the Globalized Smart Home: The SIFIS-Home Project2
Ransomware-Bitcoin Threat Intelligence Sharing Using Structured Threat Information Expression2
A Review of the Privacy-Enhancing Technologies Software Market2
Driving Cybersecurity Policy Insights From Information on the Internet2
The People Who Live in Glass Houses Are Happy the Stones Weren't Thrown at Them [From the Editors]2
Personal IoT Privacy Control at the Edge2
Measures to Ensure Cybersecurity of Industrial Enterprises: A Legal Perspective2
Deepfake Detection in Super-Recognizers and Police Officers2
Formally Verifying Industry Cryptography2
Coevolution of Security’s Body of Knowledge and Curricula2
Trusted Execution Environments for Telecoms: Strengths, Weaknesses, Opportunities, and Threats2
Katie Moussouris: Vulnerability Disclosure and Security Workforce Development2
Blind Spots of Security Monitoring in Enterprise Infrastructures: A Survey2
Formal Methods at Scale2
Investigative Techniques for the De-Anonymization of Hidden Services2
The Rise of Cybercrime and Cyber-Threat Intelligence: Perspectives and Challenges From Law Enforcement2
Incident Response as a Lawyers’ Service2
Being the Developers’ Friend: Our Experience Developing a High-Precision Tool for Secure Coding2
AI Code Generators for Security: Friend or Foe?2
What’s Driving Conflicts Around Differential Privacy for the U.S. Census2
Cybersecurity During COVID-192
Security Policy Audits: Why and How2
Balancing Public Health and Civil Liberties: Privacy Aspects of Contact-Tracing Technologies2
A View of Security as 20 Subject Areas in Four Themes2
Robot Hacking Games1
What Has Artifact Evaluation Ever Done for Us?1
Cryptographic Standards in the Post-Quantum Era1
Defensive Technology Use During the 2018-2019 Sudanese Revolution1
Toward Unseating the Unsafe C Programming Language1
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices1
Truth in Motion: The Unprecedented Risks and Opportunities of Extended Reality Motion Data1
Dissecting the Industrial Control Systems Software Supply Chain1
Security and Privacy Issues of Home Globalization1
Toward Fail Safety for Security Decisions1
Distributed Financial Exchanges: Security Challenges and Design Principles1
Securing Bystander Privacy in Mixed Reality While Protecting the User Experience1
Power in Computer Security and Privacy: A Critical Lens1
Do You Speak Cyber? Talking Security With Developers of Health Systems and Devices1
Automating Recovery in Mixed Operation Technology/IT Critical Infrastructures1
Dirty Metadata: Understanding A Threat to Online Privacy1
VAULT-Style Risk-Limiting Audits and the Inyo County Pilot1
Pseudo Ground-Truth Generators and Large-Scale Studies1
Auto-Update Considered Harmful1
Security and Privacy Research Artifacts: Are We Making Progress?1
A Viewpoint on Knowing Software: Bill of Materials Quality When You See It1
IEEE Career Center1
42nd IEEE Symposium on Security & Privacy1
Research and Industry Partnerships in Cybersecurity and Privacy Research: New Frontiers or Fueling the Tech Sector?1
A Systems Approach Toward Addressing Anonymous Abuses: Technical and Policy Considerations1
Nothing Is Good Enough: Fast and Cheap Are Undervalued as Influencers of Security Tool Adoption1
A Maturity Spectrum for Data Institutions1
Privacy Engineering From Principles to Practice: A Roadmap1
IEEE Computer Society Information1
Verifiable Sustainability in Data Centers1
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives1
Transient Execution Attacks1
It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs1
CLARK: A Design Science Research Project for Building and Sharing High-Quality Cybersecurity Curricula1
How Are Industrial Control Systems Insecure by Design? A Deeper Insight Into Real-World Programmable Logic Controllers1
Trust Me, I’m a Liar1
NIST’s Post-Quantum Cryptography Standards Competition1
On Bridges and Software1
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing1
A Viewpoint on the Societal Impact of Everyday Augmented Reality and the Need for Perceptual Human Rights1
Memory Errors and Memory Safety: A Look at Java and Rust1
Synthetic Data: Methods, Use Cases, and Risks1
Authentication of Voice Commands by Leveraging Vibrations in Wearables1
A Research Road Map for Building Secure and Resilient Software-Intensive Systems1
Large-Language-Model-Powered Agent-Based Framework for Misinformation and Disinformation Research: Opportunities and Open Challenges1
Reflections on the Past, Perspectives on the Future [From the Editors]1
Known Vulnerabilities of Open Source Projects: Where Are the Fixes?1
Open Source and Trust1
The Ethical Smart Home: Perspectives and Guidelines1
Shockvertising, Malware, and a Lack of Accountability: Exploring Consumer Risks of Virtual Reality Advertisements and Marketing Experiences1
They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web1
Memory Errors and Memory Safety: C as a Case Study1
IEEE Diversity and Inclusion Fund0
Updates From IEEE Security & Privacy’s Editor-in-Chief Sean Peisert: And Now For Something Completely Different0
Front Cover0
Advocating a Policy Push Toward Inclusive and Secure “Digital-First” Societies0
Masthead0
IEEE Annals of the History of Computing0
Front Cover0
Is Cybersecurity Liability a Liability?0
PURE Biomanufacturing: Secure, Pandemic-Adaptive Biomanufacturing0
Front Cover0
Table of Contents0
IEEE Computing Edge0
Masthead0
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription0
Table of Contents0
Identity0
IEEE Computing in Science & Engineering0
Reliability Society0
Table of Contents0
Masthead0
[Front cover]0
IEEE Computer Society Member Benefits0
Masthead0
Publications Seek 2025 Editors in Chief0
IEEE Computer Graphics and Applications0
Reliability Society0
Reproducibility: Buy Low, Sell High0
Computing Edge0
IEEE Software Magazine Call for Articles0
Welcome to the Latest “Off by One” Column0
IEEE Computer Society Career Center filler0
IEEE Jobs Board0
A Multidisciplinary Look at History and Future of Deepfake With Gartner Hype Cycle0
Masthead0
Table of Contents0
IEEE Security & Privacy Subscribe0
Cross-Architecture Binary Function Fingerprinting0
IEEE Open Journal of the Computer Society0
IEEE Computer Society Call for Papers0
Understanding the Insecurity of Processor Caches Due to Cache Timing-Based Vulnerabilities0
IEEE Computing in Science and Engineering0
IEEE Computer Graphics and Applications0
IEEE SP Over the Rainbow filler0
IEEE Computing Edge0
IEEE Computer Society Benefits0
Reliability Society0
IEEE Transactions on Computers0
Message from IEEE S&P's Outgoing Editor in Chief0
IEEE Computer Society Information0
Differential Privacy, Firm-Level Data, and the Binomial Pathology0
Masthead0
Excerpts From the New Dictionary of Cybersecurity, 20360
IEEE Computer Society Call for Papers0
Taking a Measured Approach to Investing in Information Infrastructure for Attaining Leading-Edge Trustworthy Artificial Intelligence0
Synthetic Realities and Artificial Intelligence-Generated Contents0
Front Cover0
Impact of Emerging Hardware on Security and Privacy0
The Practices and Challenges of Generating Nonidentifiable Data0
[Front cover]0
IEEE Security and Privacy Subscription0
IEEE Computer Society Information0
IEEE IT Professional Call for Articles0
IEEE Computer Society Diversity and Integrity Fund0
0.053245067596436