IEEE Security & Privacy

Papers
(The median citation count of IEEE Security & Privacy is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Understanding the Insecurity of Processor Caches Due to Cache Timing-Based Vulnerabilities54
Trust Me, I’m a Liar41
Publications Seek 2025 Editors in Chief26
Excerpts From the New Dictionary of Cybersecurity, 203626
Masthead25
IEEE Security & Privacy Subscribe24
IEEE Computer Graphics and Applications24
[Front cover]22
The Practices and Challenges of Generating Nonidentifiable Data21
Front Cover21
Cross-Architecture Binary Function Fingerprinting19
IEEE Computer Society Has You Covered!18
Open Source and Trust17
IEEE Author's Choice15
Differential Privacy, Firm-Level Data, and the Binomial Pathology15
Front Cover14
IEEE Computer Society Call for Papers14
IEEE Computing in Science and Engineering14
Masthead14
IEEE JobSite14
IEEE Pervasive Computing Call For Articles13
IEEE Transactions on Big Data13
IEEE Transactions on Computers12
Electric Sheep on the Pastures of Disinformation and Targeted Phishing Campaigns: The Security Implications of ChatGPT12
Is Vulnerability Report Confidence Redundant? Pitfalls Using Temporal Risk Scores10
Trusting Trust: Humans in the Software Supply Chain Loop10
Security and Privacy for Edge Artificial Intelligence10
Inside the Windows Security Push: A Twenty-Year Retrospective10
IEEE Intelligent Systems9
An Analysis of European Union Cybersecurity Higher Education Programs Through the Crowd-Sourced Database CyberHEAD9
Privacy-Preserving Machine Learning [Cryptography]9
Dissecting the Industrial Control Systems Software Supply Chain9
Narrowing the Software Supply Chain Attack Vectors: The SSDF Is Wonderful but not Enough9
They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web8
Security and Privacy Research Artifacts: Are We Making Progress?8
Cyber Hard Problems: The Next Generation [From the Editors]8
Cybersecurity Advocates: Force Multipliers in Security Behavior Change8
Global Cybercrime Requires a Collective Response: Are We Prepared to Ban Ransom Payments?8
IEEE Computing edge8
Citizens’ Cybersecurity Behavior: Some Major Challenges8
What’s Driving Conflicts Around Differential Privacy for the U.S. Census8
IEEE Computer Society Benefits8
The Holy Grail of Vulnerability Predictions7
IEEE Computer Society Information7
The Dual Role of Machine Learning in Data Anonymization: Top 10 Benefits and Risks7
IEEE Computing Edge [advertisement]7
IEEE Computing Edge7
IEEE Transactions on Sustainable Computing7
IEEE Pervasive Computing: Call for Articles7
Sovereignty in the Digital Era: The Quest for Continuous Access to Dependable Technological Capabilities7
IEEE Job Boards6
In Pursuit of Aviation Cybersecurity: Experiences and Lessons From a Competitive Approach6
High Assurance in the Twenty-First Century With Roger Schell6
IEEE Open Journal of the Computer Society6
The Our Reality Privacy Policy6
IEEE IT Professional Call for Articles6
Unusable Security for Attackers [From the Editors]5
IEEE Computing Edge5
IEEE Computing Edge5
IEEE Computer Society Information5
IEEE Computer Society Has You Covered!5
Data Acquisition Framework for Micromobility Vehicles Toward Driving Risk Prediction Against Cyberphysical Security Attack5
Masthead5
A First Look at Zoombombing5
Table of Contents5
IEEE Career Center5
IEEE Annals filler5
IEEE Pervasive Computing Call for Articles5
Reliability Society5
IEEE Transactions on Computers4
The Buffet Overflow Café4
Incident Response as a Lawyers’ Service4
IEEE Multimedia4
IEEE Computer Society Benefits4
Get Published in the New IEEE Open Journal of the Computer Society4
IEEE Computer Society Information4
[Masthead]4
Empower New Code Citizens to Reflect and Communicate on Code Security4
Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures4
Watts S. Humphrey Software Quality Award Nominations4
Front Cover4
Nudging Software Developers Toward Secure Code4
IEEE Computer Society Information4
IEEE Computer Society Diversity and Inclusion Fund4
Inclusive Internet of Things Privacy Labels4
IEEE Computer Society: Call for Papers4
IEEE Diversity and Inclusion Fund3
IEEE Computer Society Information3
IEEE Computing Edge3
Front Cover3
Synthetic Realities and Artificial Intelligence-Generated Contents3
Impact of Emerging Hardware on Security and Privacy3
Adapting a Publicly Focused Individual Health-Care Model to Cybersecurity3
IEEE Computer Society Member Benefits3
Table of Contents3
Front Cover3
IEEE Computer Society Diversity and Integrity Fund3
What Has Artifact Evaluation Ever Done for Us?3
Migrating C to Rust for Memory Safety3
IEEE Computer Graphics and Applications3
IEEE Computing in Science & Engineering3
Table of Contents3
Front Cover3
Computing Edge3
Power in Computer Security and Privacy: A Critical Lens3
Hardware Security in the Era of Emerging Device and System Technologies3
Securing Bystander Privacy in Mixed Reality While Protecting the User Experience2
OpenSSF Scorecard: On the Path Toward Ecosystem-Wide Automated Security Metrics2
IEEE Career Center2
IEEE Annals of the History of Computing2
Computing Edge2
Enhancing Security Testing for Identity Management Implementations: Introducing Micro-Id-Gym Language and Micro-Id-Gym Testing Tool2
We Need a “Building Inspector for IoT” When Smart Homes Are Sold2
Certificate Transparency in Google Chrome: Past, Present, and Future2
IEEE Computer Society Call for Special issue Proposals2
Shockvertising, Malware, and a Lack of Accountability: Exploring Consumer Risks of Virtual Reality Advertisements and Marketing Experiences2
Reconfigurable Digital Twin to Support Research, Education, and Training in the Defense of Critical Infrastructure2
IEEE Security & Privacy Subscribe filler2
IEEE Computer Society CFP filler2
The State of the Art in Integer Factoring and Breaking Public-Key Cryptography2
Usable Security and Privacy for Security and Privacy Workers2
IEEE Computer Society Member Benefits2
Current Perspectives on Securing Critical Infrastructures’ Supply Chains2
Reliability Society2
Table of Contents2
Equity and Privacy: More Than Just a Tradeoff2
Embedding Privacy Into Design Through Software Developers: Challenges and Solutions2
IEEE Jobs Board2
Toward Fail Safety for Security Decisions2
Challenges of Producing Software Bill of Materials for Java2
Masthead2
IEEE Career Center2
A Real-Time Cosimulation Testbed for Electric Vehicle Charging and Smart Grid Security1
IEEE Computer Society Member Benefits1
IEEE Computer Society Information1
Security and Privacy in the Metaverse1
IEEE Annals of the History of Computing1
IEEE Computing in Science and Engineering1
Reliability Society1
IEEE Annals of the History of Computing1
Table of Contents1
Unleashing Malware Analysis and Understanding With Generative AI1
Masthead1
An Informative Security and Privacy “Nutrition” Label for Internet of Things Devices1
Side-Channel Attacks: A Short Tour1
Masthead1
Contextual Integrity, Explained: A More Usable Privacy Definition1
IEEE Career Center1
{In Earth} Until (Ready)1
What Do We Owe?1
Delta Security Certification for Software Supply Chains1
Security Certification: Is It Box Ticking?1
A Viewpoint: Harmonizing the Diverse Memory Safety Fronts1
Why Is Static Application Security Testing Hard to Learn?1
Computing Edge1
IEEE Jobs Board1
Sphynx: A Deep Neural Network Design for Private Inference1
IEEE Annals of the History of Computing1
Human Versus Machine: A Comparative Analysis in Detecting Artificial Intelligence-Generated Images1
Online Log Data Analysis With Efficient Machine Learning: A Review1
IEEE tbd filler1
Large Language Models and Security1
The Need of Testbeds for Cyberphysical System Security1
Front Cover1
Reliability Society1
IEEE Computer Society Has You Covered1
IEEE CS CFP filler1
End-to-End Security: When Do We Have It?1
Opportunities and Challenges in Securing Critical Infrastructures Through Cryptography1
Whither Software?1
Masthead1
The People Who Live in Glass Houses Are Happy the Stones Weren't Thrown at Them [From the Editors]1
Eight Lightweight Usable Security Principles for Developers1
Memory Safety1
IEEE Annals of the History of Computing [advertisement]1
Integrating Cybersecurity and Artificial Intelligence Research in Engineering and Computer Science Education1
ComputingEdge1
The Amplification of Online Deviancy Through the Language of Violent Crime, War, and Aggression1
Masthead1
IEEE Open Journal of the Computer Society1
On Bridges and Software1
IEEE Computing Edge1
Do You Speak Cyber? Talking Security With Developers of Health Systems and Devices1
Table of Contents1
Disinformation and Reflections From Usable Security0
IEEE Computer Society Member Benefits0
IEEE Author’s Choice0
Computing Edge0
A Critical Overview of Privacy in Machine Learning0
Software Bill of Materials as a Proactive Defense0
IEEE Job Boards0
IEEE Annals of the History of Computing0
IEEE Computer Society Elections0
Medical Device Forensics0
IEEE Computing Edge0
Table of Contents0
IEEE Security and Privacy Subscribe0
IEEE Computing in Science and Engineering0
On Software Infrastructure: Develop, Prove, Profit?0
IEEE Annals of the History of Computing0
IEEE Computing Edge0
Analyzing Cryptography in the Wild: A Retrospective0
Privacy Compliance: Can Technology Come to the Rescue?0
Physical Inspection and Attacks on Electronics: An Academic Course for the Hardware Cybersecurity Workforce0
How Are Industrial Control Systems Insecure by Design? A Deeper Insight Into Real-World Programmable Logic Controllers0
IEEE Pervasive Computing0
CHERI: Hardware-Enabled C/C++ Memory Protection at Scale0
What I’ve Learned0
2023 IEEE Computer Society Nomination for Watts S. Humphrey Award0
Security Requirements and Secure Software Design0
IEEE Computer Society Information0
Threat Modeling Tools: A Taxonomy0
Security as an Artificial Science, System Administration, and Tools0
IEEE Computing in Science and Engineering0
IEEE OJ Computer Society filler0
IEEE CS Job Boards0
IEEE Computer Society Member Benefits0
Digital Twin Security: A Perspective on Efforts From Standardization Bodies0
IEEE Computing Edge0
Personal IoT Privacy Control at the Edge0
Table of Contents0
The Future of Digital Investigation: Automated Legal Inference0
IT Professional: Call for Articles0
Perceptual Hash Inversion Attacks on Image-Based Sexual Abuse Removal Tools0
IEEE Computer Society Call For Papers0
IEEE Open Journal of the Computer Society0
Table of Contents0
Hot Topics in Security and Privacy Standardization at the IETF and Beyond0
Masthead0
IEEE Computer Society Career Center0
Journey to the Center of Software Supply Chain Attacks0
NIST’s Post-Quantum Cryptography Standards Competition0
Over the Rainbow Podcast0
Reliability Society0
Reliability Society0
Contextualizing Formal Verification for Systems Security Engineering0
Securing Code: A View on the Cultural Aspects of Resilience0
IEEE Computer Society Career Center0
Deepfake Detection in Super-Recognizers and Police Officers0
Table of Contents0
IEEE Computer Society Call for Papers0
Decentralized Public-Key Infrastructure With Blockchain in V2X Communications: Promising or Only Euphoria?0
IEEE Open Journal of the Computer Society0
Protecting Cryptographic Libraries Against Side-Channel and Code-Reuse Attacks0
IEEE Pervasive Computing0
Software Bills of Materials Are Required. Are We There Yet?0
The United Kingdom’s Cyber Security Degree Certification Program: A Cyber Security Body of Knowledge Case Study0
A Viewpoint: Safer Heaps With Practical Architectural Security Primitives0
Trustworthy AI Means Public AI [Last Word]0
Friction Matters: Balancing the Pursuit of Perfect Protection With Target Hardening0
0.055539131164551