IEEE Security & Privacy

Papers
(The TQCC of IEEE Security & Privacy is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
Front Cover115
IEEE Computer Graphics and Applications45
IEEE Computing Edge33
Front Cover33
Masthead23
IEEE Computer Graphics and Applications21
IEEE Diversity and Inclusion Fund21
IEEE IT Professional Call for Articles18
[Front cover]18
Understanding the Insecurity of Processor Caches Due to Cache Timing-Based Vulnerabilities17
IEEE Computer Society Information17
Masthead17
IEEE Computer Society Call for Papers15
Cross-Architecture Binary Function Fingerprinting13
[Front cover]13
Reliability Society13
Identity12
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription12
Impact of Emerging Hardware on Security and Privacy12
Table of Contents12
A Multidisciplinary Look at History and Future of Deepfake With Gartner Hype Cycle11
Synthetic Realities and Artificial Intelligence-Generated Contents11
A Cybersecurity Moonshot11
IEEE Computing Edge10
Front Cover9
IEEE Computer Society Career Center filler9
IEEE Computer Society Call for Papers9
Masthead9
Verify It’s You: How Users Perceive Risk-Based Authentication9
IEEE Software Magazine Call for Articles8
Reconfigurable Digital Twin to Support Research, Education, and Training in the Defense of Critical Infrastructure8
Is Cybersecurity Liability a Liability?8
IEEE Transactions on Computers7
IEEE Computer Society Information7
IEEE Annals of the History of Computing7
Computing Edge7
Trust Me, I’m a Liar6
Advocating a Policy Push Toward Inclusive and Secure “Digital-First” Societies6
What Has Artifact Evaluation Ever Done for Us?6
Formal Methods at Scale6
IEEE Computer Society Benefits6
A Review of the Privacy-Enhancing Technologies Software Market6
Cyberassured Systems Engineering at Scale6
Reliability Society6
IEEE Computer Society Member Benefits5
Table of Contents5
The Practices and Challenges of Generating Nonidentifiable Data5
Front Cover5
Table of Contents5
Updates From IEEE Security & Privacy’s Editor-in-Chief Sean Peisert: And Now For Something Completely Different5
IEEE Computer Society Diversity and Integrity Fund5
IEEE Security and Privacy Subscription5
VAULT-Style Risk-Limiting Audits and the Inyo County Pilot5
Supporting Artificial Intelligence/Machine Learning Security Workers Through an Adversarial Techniques, Tools, and Common Knowledge Framework5
IEEE SP Over the Rainbow filler5
IEEE Computing in Science and Engineering5
IEEE Open Journal of the Computer Society5
IEEE Security & Privacy Subscribe5
IEEE Computing in Science & Engineering5
Publications Seek 2025 Editors in Chief5
Memory Errors and Memory Safety: C as a Case Study4
IEEE Jobs Board4
Welcome to the Latest “Off by One” Column4
Full Spatial and Temporal Memory Safety for C4
Masthead4
Table of Contents4
Differential Privacy, Firm-Level Data, and the Binomial Pathology4
Excerpts From the New Dictionary of Cybersecurity, 20364
Taking a Measured Approach to Investing in Information Infrastructure for Attaining Leading-Edge Trustworthy Artificial Intelligence4
Masthead4
Convergence: Ongoing4
Automating Recovery in Mixed Operation Technology/IT Critical Infrastructures3
[Front cover]3
Transient Execution Attacks3
IEEE Computing Edge3
Front Cover3
Table of Contents3
IEEE Computer Society Member Benefits3
IEEE Computer Society Information3
Shockvertising, Malware, and a Lack of Accountability: Exploring Consumer Risks of Virtual Reality Advertisements and Marketing Experiences3
Adapting a Publicly Focused Individual Health-Care Model to Cybersecurity3
Power in Computer Security and Privacy: A Critical Lens3
IEEE Computer Society Information3
Migrating C to Rust for Memory Safety3
CLARK: A Design Science Research Project for Building and Sharing High-Quality Cybersecurity Curricula3
Equity and Privacy: More Than Just a Tradeoff3
Reliability Society3
IEEE Computers In Science & Engineering3
Trust in Data Security Protocols and Knowledge of Privacy and Security Technology3
Time to Change the CVSS?3
Hardware Security in the Era of Emerging Device and System Technologies3
Privacy in the Time of COVID-19: Divergent Paths for Contact Tracing and Route-Disclosure Mechanisms in South Korea2
Understanding the Security Implications of Kubernetes Networking2
IEEE Pervasive Computing Call For Articles2
IEEE Computer Society Information2
Verifiable Sustainability in Data Centers2
A Taxonomy of Attacks on Federated Learning2
OpenSSF Scorecard: On the Path Toward Ecosystem-Wide Automated Security Metrics2
IT Professional: Call for Articles2
The Data Protection Officer: A Ubiquitous Role That No One Really Knows2
IEEE Computer Society Information2
Machine Learning for Source Code Vulnerability Detection: What Works and What Isn’t There Yet2
IEEE Computer Society Call for Special issue Proposals2
IEEE Transactions on Big Data2
Reliability Society2
Auto-Update Considered Harmful2
Beyond Passwords—Challenges and Opportunities of Future Authentication2
Embedding Privacy Into Design Through Software Developers: Challenges and Solutions2
A Decade of Reoccurring Software Weaknesses2
Open Source and Trust2
Get Published in the New IEEE Transaction on Privacy2
IEEE Transactions on Sustainable Computing2
IEEE Computer Society Has You Covered!2
Masthead2
IEEE JobSite2
PURE Biomanufacturing: Secure, Pandemic-Adaptive Biomanufacturing2
Front Cover2
Securing Bystander Privacy in Mixed Reality While Protecting the User Experience2
Real-World Security Protocols2
Analyzing Cryptography in the Wild: A Retrospective2
The Art of Inclusive Gamification in Cybersecurity Training1
IEEE Computer Society: Call for Papers1
Inside the Windows Security Push: A Twenty-Year Retrospective1
Reliability Society1
Introducing IEEE Security & Privacy’s “Off by One” Column1
IEEE Transactions on Sustainable Computing1
IEEE Computer Society1
IEEE Pervasive Computing Call for Articles1
IEEE Over the Rainbow Podcast1
Current Perspectives on Securing Critical Infrastructures’ Supply Chains1
IEEE Transactions on Computers1
Front Cover1
IEEE Computing Edge1
The Fusion of Secure Function Evaluation and Logic Synthesis1
Privacy-Preserving Machine Learning [Cryptography]1
IEEE Security & Privacy Subscribe filler1
01
IEEE Job Boards1
Bridging the Cybersecurity Skills Gap: Knowledge Framework Comparative Study1
IEEE IT Professional Call for Articles1
Has Access Control Become the Weak Link?1
IEEE Jobs Boards1
Trusting Trust: Humans in the Software Supply Chain Loop1
IEEE Annals of the History of Computing1
Over the Rainbow Podcast1
IEEE Computer Society Seeks Applicants for Editors in Chief1
Front Cover1
Toward Fail Safety for Security Decisions1
IEEE Reliability Society1
A Research Road Map for Building Secure and Resilient Software-Intensive Systems1
Blind Spots of Security Monitoring in Enterprise Infrastructures: A Survey1
IEEE Computer Society Member Benefits1
Blending Shared Responsibility and Zero Trust to Secure the Industrial Internet of Things1
A View of Security as 20 Subject Areas in Four Themes1
Security and Privacy for Edge Artificial Intelligence1
IEEE Transactions on Big Data1
The Rocky Road to Sustainable Security1
[Front cover]1
Inclusive Privacy and Security1
IEEE Computer Society Member Benefits1
Ransomware-Bitcoin Threat Intelligence Sharing Using Structured Threat Information Expression1
IEEE Open Journal of the Computer Society1
IEEE Career Center1
Privacy Engineering From Principles to Practice: A Roadmap1
IEEE Annals in Computing1
Credit Card Fraud Is a Computer Security Problem1
Computing in Science & Engineering1
Software Security for the People: Free and Open Resources for Software Security Training1
IEEE Computing Edge1
Masthead1
IEEE Computer Society CFP filler1
ACSAC 2020: Furthering the Quest to Tackle Hard Problems and Find Practical Solutions1
0.061823129653931