IEEE Security & Privacy

Papers
(The median citation count of IEEE Security & Privacy is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
Front Cover115
IEEE Computer Graphics and Applications45
Front Cover33
IEEE Computing Edge33
Masthead23
IEEE Diversity and Inclusion Fund21
IEEE Computer Graphics and Applications21
IEEE IT Professional Call for Articles18
[Front cover]18
IEEE Computer Society Information17
Masthead17
Understanding the Insecurity of Processor Caches Due to Cache Timing-Based Vulnerabilities17
IEEE Computer Society Call for Papers15
[Front cover]13
Reliability Society13
Cross-Architecture Binary Function Fingerprinting13
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription12
Impact of Emerging Hardware on Security and Privacy12
Table of Contents12
Identity12
Synthetic Realities and Artificial Intelligence-Generated Contents11
A Cybersecurity Moonshot11
A Multidisciplinary Look at History and Future of Deepfake With Gartner Hype Cycle11
IEEE Computing Edge10
IEEE Computer Society Call for Papers9
Masthead9
Verify It’s You: How Users Perceive Risk-Based Authentication9
Front Cover9
IEEE Computer Society Career Center filler9
Reconfigurable Digital Twin to Support Research, Education, and Training in the Defense of Critical Infrastructure8
Is Cybersecurity Liability a Liability?8
IEEE Software Magazine Call for Articles8
IEEE Annals of the History of Computing7
Computing Edge7
IEEE Transactions on Computers7
IEEE Computer Society Information7
What Has Artifact Evaluation Ever Done for Us?6
Formal Methods at Scale6
IEEE Computer Society Benefits6
A Review of the Privacy-Enhancing Technologies Software Market6
Cyberassured Systems Engineering at Scale6
Reliability Society6
Trust Me, I’m a Liar6
Advocating a Policy Push Toward Inclusive and Secure “Digital-First” Societies6
IEEE Security and Privacy Subscription5
VAULT-Style Risk-Limiting Audits and the Inyo County Pilot5
Supporting Artificial Intelligence/Machine Learning Security Workers Through an Adversarial Techniques, Tools, and Common Knowledge Framework5
IEEE SP Over the Rainbow filler5
IEEE Computing in Science and Engineering5
IEEE Open Journal of the Computer Society5
IEEE Security & Privacy Subscribe5
IEEE Computing in Science & Engineering5
Publications Seek 2025 Editors in Chief5
IEEE Computer Society Member Benefits5
Table of Contents5
The Practices and Challenges of Generating Nonidentifiable Data5
Front Cover5
Table of Contents5
Updates From IEEE Security & Privacy’s Editor-in-Chief Sean Peisert: And Now For Something Completely Different5
IEEE Computer Society Diversity and Integrity Fund5
Masthead4
Table of Contents4
Differential Privacy, Firm-Level Data, and the Binomial Pathology4
Excerpts From the New Dictionary of Cybersecurity, 20364
Taking a Measured Approach to Investing in Information Infrastructure for Attaining Leading-Edge Trustworthy Artificial Intelligence4
Masthead4
Convergence: Ongoing4
Memory Errors and Memory Safety: C as a Case Study4
IEEE Jobs Board4
Welcome to the Latest “Off by One” Column4
Full Spatial and Temporal Memory Safety for C4
IEEE Computer Society Information3
Shockvertising, Malware, and a Lack of Accountability: Exploring Consumer Risks of Virtual Reality Advertisements and Marketing Experiences3
Adapting a Publicly Focused Individual Health-Care Model to Cybersecurity3
Power in Computer Security and Privacy: A Critical Lens3
IEEE Computer Society Information3
Hardware Security in the Era of Emerging Device and System Technologies3
CLARK: A Design Science Research Project for Building and Sharing High-Quality Cybersecurity Curricula3
Equity and Privacy: More Than Just a Tradeoff3
Reliability Society3
IEEE Computers In Science & Engineering3
Trust in Data Security Protocols and Knowledge of Privacy and Security Technology3
Time to Change the CVSS?3
Table of Contents3
Automating Recovery in Mixed Operation Technology/IT Critical Infrastructures3
[Front cover]3
Transient Execution Attacks3
IEEE Computing Edge3
Front Cover3
Migrating C to Rust for Memory Safety3
IEEE Computer Society Member Benefits3
IEEE Transactions on Sustainable Computing2
IEEE Computer Society Has You Covered!2
Masthead2
IEEE JobSite2
PURE Biomanufacturing: Secure, Pandemic-Adaptive Biomanufacturing2
Front Cover2
Securing Bystander Privacy in Mixed Reality While Protecting the User Experience2
Real-World Security Protocols2
Analyzing Cryptography in the Wild: A Retrospective2
Privacy in the Time of COVID-19: Divergent Paths for Contact Tracing and Route-Disclosure Mechanisms in South Korea2
Understanding the Security Implications of Kubernetes Networking2
IEEE Pervasive Computing Call For Articles2
IEEE Computer Society Information2
Verifiable Sustainability in Data Centers2
A Taxonomy of Attacks on Federated Learning2
OpenSSF Scorecard: On the Path Toward Ecosystem-Wide Automated Security Metrics2
IT Professional: Call for Articles2
The Data Protection Officer: A Ubiquitous Role That No One Really Knows2
IEEE Computer Society Information2
Machine Learning for Source Code Vulnerability Detection: What Works and What Isn’t There Yet2
IEEE Computer Society Call for Special issue Proposals2
IEEE Transactions on Big Data2
Reliability Society2
Auto-Update Considered Harmful2
Beyond Passwords—Challenges and Opportunities of Future Authentication2
Embedding Privacy Into Design Through Software Developers: Challenges and Solutions2
A Decade of Reoccurring Software Weaknesses2
Open Source and Trust2
Get Published in the New IEEE Transaction on Privacy2
The Rocky Road to Sustainable Security1
[Front cover]1
Inclusive Privacy and Security1
IEEE Computer Society Member Benefits1
Ransomware-Bitcoin Threat Intelligence Sharing Using Structured Threat Information Expression1
IEEE Open Journal of the Computer Society1
Privacy Engineering From Principles to Practice: A Roadmap1
IEEE Career Center1
Credit Card Fraud Is a Computer Security Problem1
IEEE Annals in Computing1
Software Security for the People: Free and Open Resources for Software Security Training1
Computing in Science & Engineering1
IEEE Computing Edge1
Masthead1
IEEE Computer Society CFP filler1
ACSAC 2020: Furthering the Quest to Tackle Hard Problems and Find Practical Solutions1
The Art of Inclusive Gamification in Cybersecurity Training1
IEEE Computer Society: Call for Papers1
Inside the Windows Security Push: A Twenty-Year Retrospective1
Reliability Society1
Introducing IEEE Security & Privacy’s “Off by One” Column1
IEEE Transactions on Sustainable Computing1
IEEE Computer Society1
IEEE Pervasive Computing Call for Articles1
Current Perspectives on Securing Critical Infrastructures’ Supply Chains1
IEEE Over the Rainbow Podcast1
Front Cover1
IEEE Transactions on Computers1
The Fusion of Secure Function Evaluation and Logic Synthesis1
IEEE Computing Edge1
Privacy-Preserving Machine Learning [Cryptography]1
IEEE Security & Privacy Subscribe filler1
01
IEEE Job Boards1
Bridging the Cybersecurity Skills Gap: Knowledge Framework Comparative Study1
IEEE IT Professional Call for Articles1
Has Access Control Become the Weak Link?1
IEEE Jobs Boards1
Trusting Trust: Humans in the Software Supply Chain Loop1
IEEE Annals of the History of Computing1
IEEE Computer Society Seeks Applicants for Editors in Chief1
Over the Rainbow Podcast1
Toward Fail Safety for Security Decisions1
Front Cover1
A Research Road Map for Building Secure and Resilient Software-Intensive Systems1
IEEE Reliability Society1
Blind Spots of Security Monitoring in Enterprise Infrastructures: A Survey1
IEEE Computer Society Member Benefits1
Blending Shared Responsibility and Zero Trust to Secure the Industrial Internet of Things1
A View of Security as 20 Subject Areas in Four Themes1
Security and Privacy for Edge Artificial Intelligence1
IEEE Transactions on Big Data1
IEEE Computer Graphics and Applications0
IEEE Computer Society Diversity and Inclusion Fund0
Over the Rainbow Podcast0
Designing a K-16 Cybersecurity Collaborative: CIPHER0
The People Who Live in Glass Houses Are Happy the Stones Weren't Thrown at Them [From the Editors]0
A Viewpoint: Harmonizing the Diverse Memory Safety Fronts0
IEEE Computer Society Call for Papers0
Incident Response as a Lawyers’ Service0
Get Published in the New IEEE Transactions on Privacy0
IEEE Computer Society - Call for Papers0
IEEE CS Job Boards0
IEEE Computer Society Call for Papers0
IEEE CS IT Professional filler0
Table of Contents0
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives0
Why Is Static Application Security Testing Hard to Learn?0
On Software Infrastructure: Develop, Prove, Profit?0
The Task Piper0
Masthead0
Being the Developers’ Friend: Our Experience Developing a High-Precision Tool for Secure Coding0
IEEE Job Boards0
Memory Corruption at the Border of Trusted Execution0
IEEE Multimedia0
IEEE Computer Society Information0
IEEE Author’s Choice0
Decentralized Public-Key Infrastructure With Blockchain in V2X Communications: Promising or Only Euphoria?0
Synthetic Realities and Artificial Intelligence-Generated Contents0
IEEE Computing in Science and Engineering0
IEEE Computing in Science and Engineering0
IEEE Transactions on Computers Call for Papers0
Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions0
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media0
Comprehensive Memory Safety Validation: An Alternative Approach to Memory Safety0
IEEE Reliability Society0
Table of Contents0
Masthead0
IEEE TC Generic CFP filler0
A Critical Overview of Privacy in Machine Learning0
IEEE Computer Society Benefits0
Security and Privacy in the Metaverse0
What I’ve Learned0
IEEE Computer Society Diversity and Inclusion0
The Seven Golden Principles of Effective Anomaly-Based Intrusion Detection0
Threat Modeling Tools: A Taxonomy0
Table of Contents0
The Need of Testbeds for Cyberphysical System Security0
IEEE Computer Society Information0
IEEE Reliability Society0
Fuzzerfly Effect: Hardware Fuzzing for Memory Safety0
IEEE Transactions on Sustainable Computing0
IEEE Computer Society Has You Covered0
IEEE Career Center0
Computing Edge0
Degenerative AI?0
IEEE Computer Society Call for Papers0
A First Look at Zoombombing0
Challenges in Cryptography0
IEEE Jobs Board0
AI Safety: A Poisoned Chalice?0
Front Cover0
IEEE Computer Society Has You Covered!0
Building Principles for Lawful Cyber Lethal Autonomous Weapons0
IEEE Computer Graphics and Applications0
IEEE Pervasive Computing0
Table of Contents0
Secure Messaging Authentication Ceremonies Are Broken0
IEEE Computer Society Information0
Evaluating Security Through Isolation and Defense in Depth0
The Ransomware Threat to Energy-Delivery Systems0
Eight Lightweight Usable Security Principles for Developers0
IEEE Computer Society Has You Covered!0
Sphynx: A Deep Neural Network Design for Private Inference0
Reliability Society0
A Viewpoint: Safer Heaps With Practical Architectural Security Primitives0
Computing in Science & Engineering0
Masthead0
Threshold Signatures0
IEEE Computer Society Information0
0.15009689331055