IEEE Security & Privacy

Papers
(The median citation count of IEEE Security & Privacy is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Publications Seek 2025 Editors in Chief69
Trust Me, I’m a Liar38
IEEE Security & Privacy Subscribe37
[Front cover]37
IEEE Computer Graphics and Applications35
Masthead30
Front Cover26
Differential Privacy, Firm-Level Data, and the Binomial Pathology25
IEEE Computer Society Has You Covered!24
Excerpts From the New Dictionary of Cybersecurity, 203624
Cross-Architecture Binary Function Fingerprinting24
IEEE Author's Choice21
Open Source and Trust21
Masthead19
The Practices and Challenges of Generating Nonidentifiable Data19
IEEE Computing in Science and Engineering17
IEEE Computer Society Call for Papers17
Front Cover17
IEEE JobSite16
IEEE Pervasive Computing Call For Articles15
IEEE Transactions on Big Data14
IEEE Computer Society Benefits14
IEEE Intelligent Systems14
Cyber Hard Problems: The Next Generation [From the Editors]14
Inside the Windows Security Push: A Twenty-Year Retrospective13
An Analysis of European Union Cybersecurity Higher Education Programs Through the Crowd-Sourced Database CyberHEAD13
Narrowing the Software Supply Chain Attack Vectors: The SSDF Is Wonderful but not Enough12
Privacy-Preserving Machine Learning [Cryptography]11
IEEE Transactions on Computers11
IEEE Emerging Technologies10
Trusting Trust: Humans in the Software Supply Chain Loop10
Table of Contents10
Reliability Society10
IEEE Volunteer Service Awards10
Dissecting the Industrial Control Systems Software Supply Chain10
Electric Sheep on the Pastures of Disinformation and Targeted Phishing Campaigns: The Security Implications of ChatGPT10
IEEE Computer Society Information9
IEEE Computing edge9
IEEE Transactions on Sustainable Computing9
Sovereignty in the Digital Era: The Quest for Continuous Access to Dependable Technological Capabilities9
Global Cybercrime Requires a Collective Response: Are We Prepared to Ban Ransom Payments?9
The Dual Role of Machine Learning in Data Anonymization: Top 10 Benefits and Risks9
IEEE Career Center9
IEEE Pervasive Computing: Call for Articles9
They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web9
What’s Driving Conflicts Around Differential Privacy for the U.S. Census9
Securing Networks with Programmable Data Planes: Opportunities and Challenges8
Citizens’ Cybersecurity Behavior: Some Major Challenges8
The Holy Grail of Vulnerability Predictions8
IEEE Job Boards7
IEEE Computing Edge7
High Assurance in the Twenty-First Century With Roger Schell7
IEEE Annals filler7
Security and Privacy Research Artifacts: Are We Making Progress?7
IEEE Computing Edge7
Unusable Security for Attackers [From the Editors]6
Masthead6
IEEE Computing Edge6
In Pursuit of Aviation Cybersecurity: Experiences and Lessons From a Competitive Approach6
IEEE Computer Society Has You Covered!6
To Trust or Not To Trust6
The Our Reality Privacy Policy6
IEEE Career Center6
IEEE Emerging Technologies6
Data Acquisition Framework for Micromobility Vehicles Toward Driving Risk Prediction Against Cyberphysical Security Attack6
Watts S. Humphrey Software Quality Award Nominations5
Learning-Based Internet of Things Honeypots for Cyber Deception5
Reliability Society5
A First Look at Zoombombing5
The Buffet Overflow Café5
IEEE Computer Society Information5
Empower New Code Citizens to Reflect and Communicate on Code Security5
IEEE Multimedia5
IEEE Computer Society Information5
IEEE Computer Society Benefits5
IEEE Computer Society Diversity and Inclusion Fund5
Incident Response as a Lawyers’ Service5
IEEE Computer Graphics and Applications4
Computing Edge4
The Double Burden of Moderators: Safeguarding Communities While Facing Identity-Based Harassment4
Impact of Emerging Hardware on Security and Privacy4
IEEE Transactions on Privacy4
Lowering the Bar: How Large Language Models Can be Used as a Copilot by Hardware Hackers4
Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures4
Inclusive Internet of Things Privacy Labels4
IEEE Diversity and Inclusion Fund4
IEEE Transactions on Computers4
Software Development and the Near-Ubiquitous Acceptance of Mystery Meat4
Adapting a Publicly Focused Individual Health-Care Model to Cybersecurity4
Nudging Software Developers Toward Secure Code4
IEEE Computer Society Information4
Table of Contents4
IEEE Computer Society Information4
Front Cover4
Why Is Johnny Getting Groomed in Roblox?4
Table of Contents4
Get Published in the New IEEE Open Journal of the Computer Society4
IEEE Computer Society: Call for Papers4
IEEE Computing Edge3
Front Cover3
Power in Computer Security and Privacy: A Critical Lens3
OpenSSF Scorecard: On the Path Toward Ecosystem-Wide Automated Security Metrics3
IEEE Open Journal of the Computer Society3
Masthead3
Hardware Security in the Era of Emerging Device and System Technologies3
IEEE Career Center3
Front Cover3
Obstacles to Practical Supply Chain Risk Management for Digital Components3
IEEE Transactions on Sustainable Computing3
IEEE Computer Society Call for Papers3
Embedding Privacy Into Design Through Software Developers: Challenges and Solutions3
Reconfigurable Digital Twin to Support Research, Education, and Training in the Defense of Critical Infrastructure3
Synthetic Realities and Artificial Intelligence-Generated Contents3
Table of Contents3
Front Cover3
Shockvertising, Malware, and a Lack of Accountability: Exploring Consumer Risks of Virtual Reality Advertisements and Marketing Experiences3
Copycat Crimes: Characterizing Code Reuse in the Mobile Android Stalkerware Ecosystem3
IEEE Computer Society Information3
Migrating C to Rust for Memory Safety3
IEEE Computer Society Benefits3
IEEE Jobs Board2
What Has Artifact Evaluation Ever Done for Us?2
IEEE Security & Privacy Subscribe filler2
Computing Edge2
Current Perspectives on Securing Critical Infrastructures’ Supply Chains2
On Bridges and Software2
Reliability Society2
An Informative Security and Privacy “Nutrition” Label for Internet of Things Devices2
Table of Contents2
IEEE Computer Society Member Benefits2
IEEE Computer Society Call for Special issue Proposals2
IEEE Career Center2
Securing Bystander Privacy in Mixed Reality While Protecting the User Experience2
Enhancing Security Testing for Identity Management Implementations: Introducing Micro-Id-Gym Language and Micro-Id-Gym Testing Tool2
The State of the Art in Integer Factoring and Breaking Public-Key Cryptography2
Masthead2
Memory Safety2
Challenges of Producing Software Bill of Materials for Java2
We Need a “Building Inspector for IoT” When Smart Homes Are Sold2
Reliability Society2
IEEE Computer Society CFP filler2
Masthead2
Usable Security and Privacy for Security and Privacy Workers2
Delta Security Certification for Software Supply Chains2
IEEE Career Center2
What Do We Owe?2
A Real-Time Cosimulation Testbed for Electric Vehicle Charging and Smart Grid Security2
A Viewpoint: Harmonizing the Diverse Memory Safety Fronts1
IEEE Annals of the History of Computing1
Eight Lightweight Usable Security Principles for Developers1
Human Versus Machine: A Comparative Analysis in Detecting Artificial Intelligence-Generated Images1
IEEE Open Journal of the Computer Society1
The Amplification of Online Deviancy Through the Language of Violent Crime, War, and Aggression1
IEEE Computer Society Has You Covered1
Front Cover1
IEEE Jobs Board1
IEEE Transactions on Big Data1
Toward Common Weakness Enumerations in Industrial Control Systems1
On Data Licenses for Open Source Threat Intelligence1
A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda1
Online Log Data Analysis With Efficient Machine Learning: A Review1
IEEE Computer Society Information1
Masthead1
Masthead1
Sphynx: A Deep Neural Network Design for Private Inference1
Whither Software?1
Side-Channel Attacks: A Short Tour1
IEEE Annals of the History of Computing1
Large Language Models and Security1
IEEE Computing in Science and Engineering1
IEEE Computer Society Benefits1
IEEE Transactions on Privacy1
Secure Access Service Edge Convergence: Recent Progress and Open Issues1
The Persistent Problem of Software Insecurity1
Masthead1
IEEE Computer Society Benefits1
Computing on Encrypted Data1
{In Earth} Until (Ready)1
Table of Contents1
Unleashing Malware Analysis and Understanding With Generative AI1
IEEE Annals of the History of Computing1
Reliability Society1
Security and Privacy in the Metaverse1
Reliability Society1
IEEE tbd filler1
Contextual Integrity, Explained: A More Usable Privacy Definition1
IEEE CS CFP filler1
IEEE Career Center1
Computing Edge1
IEEE Security and Privacy Subscription1
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware1
IEEE Computer Society1
Why Is Static Application Security Testing Hard to Learn?1
IEEE Computing Edge1
Security Policy as Code1
Do You Speak Cyber? Talking Security With Developers of Health Systems and Devices1
IEEE Reliability Society1
The Need of Testbeds for Cyberphysical System Security1
Journey to the Center of Software Supply Chain Attacks0
Clouds Are Where the (Security) Action Is: Have Honeypots Been Left in the Dust?0
Medical Device Forensics0
Digital Twin Security: A Perspective on Efforts From Standardization Bodies0
IEEE Job Boards0
A Viewpoint: Safer Heaps With Practical Architectural Security Primitives0
Personal IoT Privacy Control at the Edge0
IEEE Computer Society Career Center0
Computing Edge0
IEEE Transactions on Sustainable Computing0
Reliability Society0
Back in the Game: Privacy Concerns of Second-Hand Game Consoles0
Masthead0
Developing With Formal Methods at BedRock Systems, Inc.0
IEEE OJ Computer Society filler0
Phishing Detection Leveraging Machine Learning and Deep Learning: A Review0
IEEE IT Professionals Call for Articles0
Disinformation and Reflections From Usable Security0
IEEE Computer Society Information0
How Are Industrial Control Systems Insecure by Design? A Deeper Insight Into Real-World Programmable Logic Controllers0
IEEE Computing in Science and Engineering0
Security Requirements and Secure Software Design0
Securing Code: A View on the Cultural Aspects of Resilience0
IEEE Author’s Choice0
Decentralized Public-Key Infrastructure With Blockchain in V2X Communications: Promising or Only Euphoria?0
IEEE Computer Society Member Benefits0
Table of Contents0
Secure by Design for Everyone0
Trustworthy AI Means Public AI [Last Word]0
Protecting Cryptographic Libraries Against Side-Channel and Code-Reuse Attacks0
IEEE Pervasive Computing0
The Rise of Cybercrime and Cyber-Threat Intelligence: Perspectives and Challenges From Law Enforcement0
Exploring Public Attitudes on Technology-Facilitated Intimate Partner Violence0
Top Five Challenges in Software Supply Chain Security: Observations From 30 Industry and Government Organizations0
Perceptual Hash Inversion Attacks on Image-Based Sexual Abuse Removal Tools0
Deepfake Detection in Super-Recognizers and Police Officers0
Physical Inspection and Attacks on Electronics: An Academic Course for the Hardware Cybersecurity Workforce0
Software Bill of Materials as a Proactive Defense0
IEEE Computing Edge0
Security as an Artificial Science, System Administration, and Tools0
IEEE CS Job Boards0
IEEE Computing Edge0
The Future of Digital Investigation: Automated Legal Inference0
Software Bills of Materials Are Required. Are We There Yet?0
Table of Contents0
Table of Contents0
What I’ve Learned0
Large Language Models for Cybersecurity: New Opportunities0
Threat Modeling Tools: A Taxonomy0
On Software Infrastructure: Develop, Prove, Profit?0
Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols0
IEEE Security and Privacy Subscribe0
0.10557508468628