IEEE Security & Privacy

Papers
(The TQCC of IEEE Security & Privacy is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
A Taxonomy of Attacks on Federated Learning85
Unleashing the Digital Twin's Potential for ICS Security42
Perspectives on the SolarWinds Incident38
Seven Ways to Evaluate the Utility of Synthetic Data32
A Critical Overview of Privacy in Machine Learning27
Doers, Not Watchers: Intelligent Autonomous Agents Are a Path to Cyber Resilience23
Top Five Challenges in Software Supply Chain Security: Observations From 30 Industry and Government Organizations21
Privacy Regulations, Smart Roads, Blockchain, and Liability Insurance: Putting Technologies to Work18
Privacy in the Time of COVID-19: Divergent Paths for Contact Tracing and Route-Disclosure Mechanisms in South Korea17
Understanding the Security Implications of Kubernetes Networking17
Challenges and Opportunities in Cyberphysical Systems Security: A Physics-Based Perspective15
Dealing With COVID-19 Network Traffic Spikes [Cybercrime and Forensics]15
Zero Trust Architecture: Does It Help?15
Are We Preparing Students to Build Security In? A Survey of European Cybersecurity in Higher Education Programs [Education]14
Security and Privacy in Internet of Things-Enabled Smart Cities: Challenges and Future Directions14
SgxPectre: Stealing Intel Secrets From SGX Enclaves via Speculative Execution13
Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery13
Data Privacy and Trustworthy Machine Learning12
Different Kind of Smells: Security Smells in Infrastructure as Code Scripts12
Verify It’s You: How Users Perceive Risk-Based Authentication11
Time to Change the CVSS?11
SolarWinds and the Challenges of Patching: Can We Ever Stop Dancing With the Devil?10
Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble10
How Trusted Execution Environments Fuel Research on Microarchitectural Attacks10
Beyond Passwords—Challenges and Opportunities of Future Authentication10
Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols10
Toward Cybersecurity Personalization in Smart Homes9
Threat Modeling Tools: A Taxonomy8
An Informative Security and Privacy “Nutrition” Label for Internet of Things Devices8
The Ransomware Threat to Energy-Delivery Systems8
Software Bills of Materials Are Required. Are We There Yet?8
Cyberassured Systems Engineering at Scale8
The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts8
IT Security Is From Mars, Software Security Is From Venus8
Building Open Trusted Execution Environments7
Secure Messaging Authentication Ceremonies Are Broken7
Attacks on Artificial Intelligence [Last Word]7
Challenges in Cryptography7
The State of the Art in Integer Factoring and Breaking Public-Key Cryptography7
Detecting Spying Drones7
Toward a Secure Internet of Things: Directions for Research7
Never Mind the Malware, Here’s the Stegomalware7
Privacy for the People? Exploring Collective Action as a Mechanism to Shift Power to Consumers in End-User Privacy6
End-to-End Security: When Do We Have It?6
Certificate Transparency in Google Chrome: Past, Present, and Future6
Embedding Privacy Into Design Through Software Developers: Challenges and Solutions6
Phishing Detection Leveraging Machine Learning and Deep Learning: A Review6
Security Midlife Crisis: Building Security in a New World6
Best Practices Would Make Things Better in the IoT6
Equity and Privacy: More Than Just a Tradeoff6
Is Hardware More Secure Than Software?6
Complex Encoded Tile Tensors: Accelerating Encrypted Analytics6
Machine Learning for Source Code Vulnerability Detection: What Works and What Isn’t There Yet6
Seven Pain Points of Threat Analysis and Risk Assessment in the Automotive Domain5
Sphynx: A Deep Neural Network Design for Private Inference5
The Advanced Encryption Standard: 20 Years Later5
Credit Card Fraud Is a Computer Security Problem5
The Challenges of Software Cybersecurity Certification [Building Security In]5
Online Log Data Analysis With Efficient Machine Learning: A Review5
Security for Shared Electric and Automated Mobility Services in Smart Cities5
A Decade of Reoccurring Software Weaknesses5
Privacy in a Time of COVID-19: How Concerned Are You?5
Medical Device Forensics5
The Quest for Data Transparency5
Parental Controls: Safer Internet Solutions or New Pitfalls?4
Lessons Learned on Machine Learning for Computer Security4
Integrating Cybersecurity and Artificial Intelligence Research in Engineering and Computer Science Education4
Dispelling Misconceptions and Characterizing the Failings of Deepfake Detection4
Nudging Software Developers Toward Secure Code4
Problematic Privacy Policies of Voice Assistant Applications4
Dedicated Security Chips in the Age of Secure Enclaves4
StopGuessing: Using Guessed Passwords to Thwart Online Password Guessing4
Is Vulnerability Report Confidence Redundant? Pitfalls Using Temporal Risk Scores4
Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures4
Automated Privacy Preferences for Smart Home Data Sharing Using Personal Data Stores4
Privacy Compliance: Can Technology Come to the Rescue?4
Whack-a-Meltdown: Microarchitectural Security Games [Systems Attacks and Defenses]4
OpenSSF Scorecard: On the Path Toward Ecosystem-Wide Automated Security Metrics4
Technical Leverage: Dependencies Are a Mixed Blessing3
Electric Sheep on the Pastures of Disinformation and Targeted Phishing Campaigns: The Security Implications of ChatGPT3
Forensic Event Analysis: From Seemingly Unrelated Data to Understanding3
Privacy-Preserving and Sustainable Contact Tracing Using Batteryless Bluetooth Low-Energy Beacons3
Benchmarking Flaws Undermine Security Research3
“Free” as in Freedom to Protest?3
End-to-End Verifiable E-Voting Trial for Polling Station Voting3
The United Kingdom’s Cyber Security Degree Certification Program: A Cyber Security Body of Knowledge Case Study3
A Self-Healing Mechanism for Internet of Things Devices3
Wake Up Digital Forensics’ Community and Help Combat Ransomware3
Security and Privacy for Edge Artificial Intelligence3
What We Have Here Is Failure to Validate: Summer of LangSec3
Rectification of Syntactic and Semantic Privacy Mechanisms3
Computing on Encrypted Data3
Being the Developers’ Friend: Our Experience Developing a High-Precision Tool for Secure Coding3
Backdoors Against Natural Language Processing: A Review3
Current Perspectives on Securing Critical Infrastructures’ Supply Chains3
Toward Hardware Security Property Generation at Scale3
A Cybersecurity Moonshot3
Security Verification of the OpenTitan Hardware Root of Trust3
Demystifying Android’s Scoped Storage Defense3
Decentralized Public-Key Infrastructure With Blockchain in V2X Communications: Promising or Only Euphoria?3
(In)secure Smart Device Use Among Senior Citizens3
A Real-Time Cosimulation Testbed for Electric Vehicle Charging and Smart Grid Security3
Citizens’ Cybersecurity Behavior: Some Major Challenges3
Disinformation and Reflections From Usable Security2
Cybersecurity During COVID-192
Courseware as Code: Instituting Agile Courseware Collaboration2
A View of Security as 20 Subject Areas in Four Themes2
Ransomware-Bitcoin Threat Intelligence Sharing Using Structured Threat Information Expression2
Formal Methods at Scale2
Investigative Techniques for the De-Anonymization of Hidden Services2
Action Bias and the Two Most Dangerous Words in Cybersecurity Incident Response: An Argument for More Measured Incident Response2
Incident Response as a Lawyers’ Service2
Personal IoT Privacy Control at the Edge2
Distributed Self-Sovereign-Based Access Control System2
Opportunities and Challenges in Securing Critical Infrastructures Through Cryptography2
One Giant Leap for Computer Security2
Security Policy Audits: Why and How2
Balancing Public Health and Civil Liberties: Privacy Aspects of Contact-Tracing Technologies2
Blind Spots of Security Monitoring in Enterprise Infrastructures: A Survey2
Are Machine Learning Models for Malware Detection Ready for Prime Time?2
Driving Cybersecurity Policy Insights From Information on the Internet2
Modeling Large-Scale Manipulation in Open Stock Markets2
The Seven Golden Principles of Effective Anomaly-Based Intrusion Detection2
With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security2
Blockchains and Stealth Tactics for Teaching Security2
Cybersecurity Advocates: Force Multipliers in Security Behavior Change2
Challenges of Producing Software Bill of Materials for Java2
Preserving Privacy in the Globalized Smart Home: The SIFIS-Home Project2
The Data Protection Officer: A Ubiquitous Role That No One Really Knows2
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware2
Privacy in the Era of 5G, IoT, Big Data, and Machine Learning2
What Will It Take?2
Developing With Formal Methods at BedRock Systems, Inc.2
The People Who Live in Glass Houses Are Happy the Stones Weren't Thrown at Them [From the Editors]2
Research and Industry Partnerships in Cybersecurity and Privacy Research: New Frontiers or Fueling the Tech Sector?1
Coevolution of Security’s Body of Knowledge and Curricula1
Transient Execution Attacks1
Memory Errors and Memory Safety: C as a Case Study1
Security Issues in Situational Awareness: Adversarial Threats and Mitigation Techniques1
What Has Artifact Evaluation Ever Done for Us?1
Measures to Ensure Cybersecurity of Industrial Enterprises: A Legal Perspective1
Cryptographic Standards in the Post-Quantum Era1
IEEE Euro S&P: The Younger Sibling Across the Pond Following in Oakland's Footsteps1
Machine Learning Security and Privacy1
Formally Verifying Industry Cryptography1
Authentication of Voice Commands by Leveraging Vibrations in Wearables1
They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web1
A Systems Approach Toward Addressing Anonymous Abuses: Technical and Policy Considerations1
Memory Protection Keys: Facts, Key Extension Perspectives, and Discussions1
Nothing Is Good Enough: Fast and Cheap Are Undervalued as Influencers of Security Tool Adoption1
Katie Moussouris: Vulnerability Disclosure and Security Workforce Development1
Built-In Cybersecurity: Insights Into Product Security for Cyberphysical Systems at a Large Company1
Automating Recovery in Mixed Operation Technology/IT Critical Infrastructures1
Distributed Financial Exchanges: Security Challenges and Design Principles1
VAULT-Style Risk-Limiting Audits and the Inyo County Pilot1
Journey to the Center of Software Supply Chain Attacks1
It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs1
A Review of the Privacy-Enhancing Technologies Software Market1
Pseudo Ground-Truth Generators and Large-Scale Studies1
Auto-Update Considered Harmful1
What’s Driving Conflicts Around Differential Privacy for the U.S. Census1
A Maturity Spectrum for Data Institutions1
IEEE Career Center1
IEEE Computer Society Information1
On Bridges and Software1
Known Vulnerabilities of Open Source Projects: Where Are the Fixes?1
Toward Unseating the Unsafe C Programming Language1
Usable Security and Privacy for Security and Privacy Workers1
Trusting Trust: Humans in the Software Supply Chain Loop1
Reflections on the Past, Perspectives on the Future [From the Editors]1
CLARK: A Design Science Research Project for Building and Sharing High-Quality Cybersecurity Curricula1
Preparing America's Cyber Intelligence Workforce1
Trust Me, I’m a Liar1
The Ethical Smart Home: Perspectives and Guidelines1
Teaching Secure Acquisition in Higher Education1
Addressing Cyber Threats in Biology1
Contextual Integrity, Explained: A More Usable Privacy Definition1
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing1
Challenges and Opportunities for Beyond-5G Wireless Security1
Security and Privacy Research Artifacts: Are We Making Progress?1
Security and Privacy Issues of Home Globalization1
Defensive Technology Use During the 2018-2019 Sudanese Revolution1
Trusted Execution Environments for Telecoms: Strengths, Weaknesses, Opportunities, and Threats1
0.030823945999146