Journal: IEEE Security & Privacy

Volume 12, Issue 6

3 -- 5Shari Lawrence Pfleeger. Technology, Transparency, and Trust
9 -- 12Gary McGraw. Silver Bullet Talks with the IEEE Center for Secure Design
13 -- 14Sean Peisert, Jonathan Margulies. Closing the Gap on Securing Energy Sector Control Systems [Guest editors' introduction]
15 -- 23Carlos Barreto, Jairo Alonso Giraldo, Alvaro A. Cárdenas, Eduardo Mojica-Nava, Nicanor Quijano. Control Systems for the Power Grid and Their Resiliency to Attacks
24 -- 31Moses Schwartz, John Mulder, Adrian R. Chavez, Benjamin A. Allan. Emerging Techniques for Field Device Security
32 -- 39Chuck McParland, Sean Peisert, Anna Scaglione. Monitoring Security of Networked Control Systems: It's the Physics
40 -- 47Saman A. Zonouz, Julian L. Rrushi, Stephen E. McLaughlin. Detecting Industrial Control Malware Using Automated PLC Code Analytics
48 -- 54Ryan Ellis. Regulating Cybersecurity: Institutional Learning or a Lesson in Futility?
55 -- 58Sean Peisert, Jonathan Margulies, Eric Byres, Paul Dorey, Dale Peterson, Zach Tudor. Control Systems Security from the Front Lines
59 -- 66Francien Dechesne, Dina Hadziosmanovic, Wolter Pieters. Experimenting with Incentives: Security in Pilots for Future Grids
68 -- 74Jungwoo Ryoo, Syed Rizvi, William Aiken, John Kissell. Cloud Security Auditing: Challenges and Emerging Approaches
75 -- 78Frank Kargl, Rens Wouter van der Heijden, Hartmut König, Alfonso Valdes, Marc Dacier. Insights on the Security and Dependability of Industrial Control Systems
79 -- 83Melissa Dark. Advancing Cybersecurity Education
84 -- 88Wendy M. Grossman. "Emergency" Ushers in a New Era in British Communications Surveillance
89 -- 93Lorrie Faith Cranor, Norbou Buchler. Better Together: Usability and Security Go Hand in Hand
94 -- 96Michael Lesk. Trust, but Verify
97 -- 101Todd Bauer, Jason Hamlet. Physical Unclonable Functions: A Primer
102 -- 107Benjamin Edelman. Accountable? The Problems and Solutions of Online Ad Optimization
108 -- 0Steven M. Bellovin. What Should Crypto Look Like?

Volume 12, Issue 5

3 -- 4Shari Lawrence Pfleeger. Expanding to Meet Readers' Needs
6 -- 8Gary McGraw. Silver Bullet Talks with Bart Miller
9 -- 12Sean Peisert, Jonathan Margulies, David M. Nicol, Himanshu Khurana, Chris Sawall. Designed-in Security for Cyber-Physical Systems
13 -- 15Bill G. Horne. On Computer Security Incident Response Teams
16 -- 26Robin Ruefle, Audrey J. Dorofee, David A. Mundie, Allen D. Householder, Michael Murray, Samuel J. Perl. Computer Security Incident Response Team Development and Evolution
27 -- 34Kas Clark, Don Stikvoort, Eelco Stofbergen, Elly van den Heuvel. A Dutch Approach to Cybersecurity through Participation
35 -- 41Sandeep Bhatt, Pratyusa K. Manadhata, Loai Zomlot. The Operational Role of Security Information and Event Management Systems
42 -- 51Panos Kampanakis. Security Automation and Threat Information-Sharing Options
52 -- 60Sathya Chandran Sundaramurthy, John McHugh, Xinming Simon Ou, S. Raj Rajagopalan, Michael Wesch. An Anthropological Approach to Studying CSIRTs
61 -- 67Tiffani R. Chen, Daniel B. Shore, Stephen J. Zaccaro, Reeshad S. Dalal, Lois E. Tetrick, Aiva K. Gorab. An Organizational Psychology Perspective to Examining Computer Security Incident Response Teams
68 -- 77Yossi Gilad, Amir Herzberg, Haya Shulman. Off-Path Hacking: The Illusion of Challenge-Response Authentication
78 -- 81Katrine Evans. Where in the World Is My Information?: Giving People Access to Their Data
82 -- 85Cuong Manh Pham, Zachary Estrada, Phuong Cao, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer. Building Reliable and Secure Virtual Machines Using Architectural Invariants
86 -- 89Jeffrey K. MacKie-Mason. Can We Afford Privacy from Surveillance?
90 -- 93Aaron Beuhring, Kyle Salous. Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats
96 -- 0Bruce Schneier. The Future of Incident Response

Volume 12, Issue 4

3 -- 6Susan Landau. Security and Privacy: Facing Ethical Choices
8 -- 10Lee Garber. Security, Privacy, Policy, and Dependability Roundup
11 -- 13Gary McGraw. Silver Bullet Talks with Nate Fick
14 -- 21Michael Kerr, Ron G. van Schyndel. Adapting Law Enforcement Frameworks to Address the Ethical Problems of CCTV Product Propagation
22 -- 28Simson L. Garfinkel, Michael McCarrin. Can We Sniff Wi-Fi?: Implications of Joffe v. Google
29 -- 37Jan-Erik Ekberg, Kari Kostiainen, N. Asokan. The Untapped Potential of Trusted Execution Environments on Mobile Devices
38 -- 45Nir Kshetri. China's Data Privacy Regulations: A Tricky Tradeoff between ICT's Productive Utilization and Cybercontrol
46 -- 50Daniel E. Geer, Poul-Henning Kamp. Inviting More Heartbleed
51 -- 54Robert Gellman. Willis Ware's Lasting Contribution to Privacy: Fair Information Practices
55 -- 58Rebecca Balebako, Lorrie Faith Cranor. Improving App Privacy: Nudging App Developers to Protect User Privacy
59 -- 62Ari Juels, Thomas Ristenpart. Honey Encryption: Encryption beyond the Brute-Force Barrier
63 -- 67Marco Carvalho, Jared DeMott, Richard Ford, David A. Wheeler. Heartbleed 101
68 -- 70Patrick McDaniel, Brian Rivera, Ananthram Swami. Toward a Science of Secure Environments
71 -- 73Michael Lesk. Staffing for Security: Don't Optimize
74 -- 79Shari Lawrence Pfleeger. The Eyes Have It: Surveillance and How It Evolved
80 -- 84Steven M. Bellovin. By Any Means Possible: How Intelligence Agencies Have Gotten Their Data
85 -- 89John Delong. Aligning the Compasses: A Journey through Compliance and Technology
90 -- 96Daniel E. Geer. Personal Data and Government Surveillance

Volume 12, Issue 3

3 -- 4Jeremy Epstein. Phishing Our Employees
6 -- 8Lee Garber. Security, Privacy, Policy, and Dependability Roundup
9 -- 12Gary McGraw. Silver Bullet Talks with Yoshi Kohno
13 -- 14Terry Benzel. A Symposium, a Magazine, and a Community
15 -- 17Peter G. Neumann, Sean Peisert, Marvin Schaefer. The IEEE Symposium on Security and Privacy, in Retrospect
18 -- 19George Cybenko, Kathy Clark-Fisher. IEEE Security & Privacy: The Early Years
20 -- 27Michael Z. Lee, Alan M. Dunn, Jonathan Katz, Brent Waters, Emmett Witchel. Anon-Pass: Practical Anonymous Subscriptions
28 -- 36Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna. On the Workings and Current Practices of Web-Based Device Fingerprinting
37 -- 44Joel Reardon, David A. Basin, Srdjan Capkun. On Secure Data Deletion
45 -- 53Laszlo Szekeres, Mathias Payer, Tao Wei, R. Sekar. Eternal War in Memory
54 -- 60Arthur Gervais, Ghassan O. Karame, Vedran Capkun, Srdjan Capkun. Is Bitcoin a Decentralized Currency?
61 -- 65Deirdre K. Mulligan. The Enduring Importance of Transparency
66 -- 70Susan Landau. Educating Engineers: Teaching Privacy in a World of Open Doors
71 -- 73Anna Slomovic. Privacy Issues in Identity Verification
74 -- 77Milan Broz, Vashek Matyas. The TrueCrypt On-Disk Format-An Independent View
78 -- 81Michael Lesk. Does the Cloud of Surveillance Have a Silver Lining?
82 -- 84Chris Bonebrake, Lori Ross O'Neil. Attacks on GPS Time Reliability
85 -- 87Martin Ortlieb. The Anthropologist's View on Privacy
88 -- 0Steven M. Bellovin. Dr. Strangecode

Volume 12, Issue 2

7 -- 10Gary McGraw. Silver Bullet Talks with Matthew Green
11 -- 13Lee Garber. Security, Privacy, Policy, and Dependability Roundup
14 -- 15Luanne Goldrich, Carl E. Landwehr. Moving Target [Guest editors' introduction]
16 -- 26Hamed Okhravi, Thomas Hobson, David Bigelow, William W. Streilein. Finding Focus in the Blur of Moving-Target Techniques
28 -- 35Per Larsen, Stefan Brunthaler, Michael Franz. Security through Diversity: Are We There Yet?
36 -- 43Glenn A. Fink, Jereme N. Haack, A. David McKinnon, Errin W. Fulp. Defense on the Move: Ant-Based Cyber Defense
44 -- 50Cherita Corbett, Jason Uher, Jarriel Cook, Angela Dalton. Countering Intelligent Jamming with Full Protocol Stack Agility
51 -- 59Partha Pal, Richard E. Schantz, Aaron Paulos, Brett Benyo. Managed Execution Environment as a Moving-Target Defense Infrastructure
60 -- 66Fernand Lone Sang, Vincent Nicomette, Yves Deswarte. A Tool to Analyze Potential I/O Attacks against PCs
67 -- 69William H. Sanders. Quantitative Security Metrics: Unattainable Holy Grail or a Vital Breakthrough within Our Reach?
70 -- 72Diana Maimut, Reza Reyhanitabar. Authenticated Encryption: Toward Next-Generation Algorithms
73 -- 76Marco Carvalho, Richard Ford. Moving-Target Defenses for Computer Networks
77 -- 79Michael Lesk. Caller ID: Whose Privacy?
80 -- 83Emiliano De Cristofaro. Genomic Privacy and the Rise of a New Research Community
84 -- 0Bruce Schneier. Metadata = Surveillance

Volume 12, Issue 1

3 -- 4Bill G. Horne. Humans in the Loop
6 -- 8Gary McGraw. Silver Bullet Talks with Jon Callas
9 -- 10Lee Garber. Security, Privacy, Policy, and Dependability Roundup
11 -- 13Martina Angela Sasse, Charles C. Palmer. Protecting You
14 -- 19Cormac Herley. More Is Not the Answer
20 -- 27Simson L. Garfinkel. Leaking Sensitive Information in Complex Document Files-and How to Prevent It
28 -- 38Deanna D. Caputo, Shari Lawrence Pfleeger, Jesse D. Freeman, M. Eric Johnson. Going Spear Phishing: Exploring Embedded Training and Awareness
39 -- 42Martina Angela Sasse, Charles C. Palmer, Markus Jakobsson, Sunny Consolvo, Rick Wash, L. Jean Camp. Helping You Protect You
43 -- 53Ying-Dar Lin, Chia-Yin Lee, Hao-Chuan Tsai. Redefining Security Criteria for Networking Devices with Case Studies
54 -- 61Moti Geva, Amir Herzberg, Yehoshua Gev. Bandwidth Distributed Denial of Service: Attacks and Defenses
62 -- 64Susan Landau. Highlights from Making Sense of Snowden, Part II: What's Significant in the NSA Revelations
65 -- 68George Candea. The Tests-versus-Proofs Conundrum
69 -- 72Prabir Bhattacharya, Li Yang, Minzhe Guo, Kai Qian, Ming Yang. Learning Mobile Security with Labware
73 -- 76Paul Ohm. Should Sniffing Wi-Fi Be Illegal?
77 -- 79David Eckhoff, Christoph Sommer. Driving for Big Data? Privacy Concerns in Vehicular Networking
80 -- 82Richard Ford, Marco Carvalho. Protecting Me
83 -- 87Sergey Bratus, Trey Darley, Michael E. Locasto, Meredith L. Patterson, Rebecca Shapiro, Anna Shubina. Beyond Planted Bugs in "Trusting Trust": The Input-Processing Frontier
88 -- 0Daniel E. Geer. Polarization