Journal: IEEE Security & Privacy

Volume 13, Issue 6

3 -- 10Shari Lawrence Pfleeger. Spider-Man, Hubris, and the Future of Security and Privacy
12 -- 15Gary McGraw. Silver Bullet Talks with Steven M. Bellovin and Matthew Green
16 -- 17Shari Lawrence Pfleeger. Lessons Learned by Our Editorial Board
18 -- 21Rolf Oppliger. Quantitative Risk Analysis in Information Security Management: A Modern Fairy Tale
22 -- 28Charles P. Pfleeger. Lesson Learned: Security is Inevitable
30 -- 37Valerio Bellandi, Stelvio Cimato, Ernesto Damiani, Gabriele Gianini, Antonio Zilli. Toward Economic-Aware Risk Assessment on the Cloud
38 -- 43Per Håkon Meland, Inger Anne Tøndel, Bjørnar Solhaug. Mitigating Risk with Cyberinsurance
44 -- 50Artemis D. Avgerou, Yannis C. Stamatiou. Privacy Awareness Diffusion in Social Networks
52 -- 59Jungwoo Ryoo, Rick Kazman, Priya Anand. Architectural Analysis for Security
60 -- 65Rakesh Verma, Murat Kantarcioglu, David J. Marchette, Ernst L. Leiss, Thamar Solorio. Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students
66 -- 70Jeff Kosseff. A New Legal Framework for Online Anonymity: California's Privacy-Based Approach
72 -- 76Jia Song, Jim Alves-Foss. The DARPA Cyber Grand Challenge: A Competitor's Perspective
77 -- 81Atif M. Memon, Ali Anwar. Colluding Apps: Tomorrow's Mobile Malware Threat
82 -- 84Harold Thimbleby, Ross Koppel. The Healthtech Declaration
85 -- 88Michael Lesk. License Creep
89 -- 95A. A. Adams. Possessing Mobile Devices
96 -- 0Steven M. Bellovin. The Key to the Key

Volume 13, Issue 5

3 -- 5Robin E. Bloomfield. Autonomy, Robotics, and Dependability
8 -- 10Gary McGraw. Silver Bullet Talks with Bart Preneel
12 -- 15Massimo Felici, Nick Wainwright, Fabio Bisogni, Simona Cavallini. What's New in the Economics of Cybersecurity?: Observational and Empirical Studies
16 -- 23Hadi Asghari, Michel J. G. van Eeten, Johannes M. Bauer. Economics of Fighting Botnets: Lessons from a Decade of Mitigation
24 -- 32Sören Preibusch. The Value of Web Search Privacy
34 -- 41Tristan Caulfield, David J. Pym. Improving Security Policy Decisions with Models
42 -- 51Clementina Bruno, Luca Guidi, Azahara Lorite-Espejo, Daniela Pestonesi. Assessing a Potential Cyberattack on the Italian Electric System
52 -- 61Martina de Gramatica, Fabio Massacci, Woohyun Shim, Alessandra Tedeschi, Julian Williams. IT Interdependence and the Economic Fairness of Cybersecurity Regulations for Civil Aviation
63 -- 72Zahid Akhtar, Christian Micheloni, Gian Luca Foresti. Biometric Liveness Detection: Challenges and Research Opportunities
74 -- 79Masooda Bashir, April Lambert, Boyi Guo, Nasir D. Memon, Tzipora Halevi. Cybersecurity Competitions: The Human Angle
80 -- 84Katrine Evans. Vidal-Hall and Risk Management for Privacy Breaches
86 -- 89Gilles Barthe. High-Assurance Cryptography: Cryptographic Software We Can Trust
90 -- 95Juhee Kwon, M. Eric Johnson. Protecting Patient Data-The Economic Perspective of Healthcare Security
96 -- 98Jonathan Margulies. Securing Cloud-Based Applications, Part 1
99 -- 103David Modic, Ross J. Anderson. It's All Over but the Crying: The Emotional and Financial Impact of Internet Fraud
104 -- 0Daniel E. Geer. Children of the Magenta

Volume 13, Issue 4

3 -- 5Terry Benzel. A Strategic Plan for Cybersecurity Research and Development
7 -- 9Gary McGraw. Silver Bullet Talks with Katie Moussouris
10 -- 11Shari Lawrence Pfleeger. Learning from Other Disciplines
12 -- 19Denise Anthony, Timothy Stablein, Emily K. Carian. Big Brother in the Information Age: Concerns about Government Information Gathering over Time
20 -- 29Julie Steinke, Balca Bolunmez, Laura Fletcher, Vicki Wang, Alan J. Tomassetti, Kristin M. Repchick, Stephen J. Zaccaro, Reeshad S. Dalal, Lois E. Tetrick. Improving Cybersecurity Incident Response Team Effectiveness Using Teams-Based Research
30 -- 39Bilal Al Sabbagh, Stewart Kowalski. A Socio-technical Framework for Threat Modeling a Software Supply Chain
40 -- 46Kjell Jørgen Hole. Toward Anti-fragility: A Malware-Halting Technique
47 -- 51Christos Dimitrakakis, Aikaterini Mitrokotsa. Distance-Bounding Protocols: Are You Close Enough?
52 -- 59David Gugelmann, Pascal Studerus, Vincent Lenders, Bernhard Ager. Can Content-Based Data Loss Prevention Solutions Prevent Data Leakage in Web Traffic?
60 -- 65Rohit Tyagi, Tuhin Paul, B. S. Manoj, B. Thanudas. Packet Inspection for Unauthorized OS Detection in Enterprises
66 -- 72Jared DeMott. Bypassing EMET 4.1
73 -- 75John Knight. The Importance of Security Cases: Proof Is Good, But Not Enough
76 -- 79Michael Lesk. Ideas Ahead of Their Time: Digital Time Stamping
80 -- 83Jonathan Margulies. Garage Door Openers: An Internet of Things Case Study
84 -- 87Monica T. Whitty. Mass-Marketing Fraud: A Growing Concern
88 -- 0Daniel E. Geer. The Right to Be Unobserved

Volume 13, Issue 3

3 -- 4Susan Landau. What Was Samsung Thinking?
5 -- 7Gary McGraw. Silver Bullet Talks with L. Jean Camp
9 -- 15Kleanthis Dellios, Dimitrios Papanikas, Despina Polemi. Information Security Compliance over Intelligent Transport Systems: Is IT Possible?
16 -- 23Nir Kshetri. India's Cybersecurity Landscape: The Roles of the Private Sector and Public-Private Partnership
24 -- 31David A. Basin, Cas J. F. Cremers, Kunihiko Miyazaki, Sasa Radomirovic, Dai Watanabe. Improving the Security of Cryptographic Protocol Standards
32 -- 39Patricia Arias Cabarcos, Florina Almenarez, Rubén Trapero, Daniel Díaz Sánchez, Andrés Marín López. Blended Identity: Pervasive IdM for Continuous Authentication
40 -- 47Hamilton A. Turner, Jules White, Jaime A. Camelio, Christopher Williams, Brandon Amos, Robert Parker. Bad Parts: Are Our Manufacturing Systems at Risk of Silent Cyberattacks?
48 -- 54Kjell Jørgen Hole. Diversity Reduces the Impact of Malware
55 -- 58Jeremy Epstein. Weakness in Depth: A Voting Machine's Demise
59 -- 62Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague. End-to-End Verifiability in Voting Systems, from Theory to Practice
63 -- 69Jelena Mirkovic, Melissa Dark, Wenliang Du, Giovanni Vigna, Tamara Denning. Evaluating Cybersecurity Education Interventions: Three Case Studies
70 -- 73Liam M. Mayron. Biometric Authentication on Mobile Devices
74 -- 79J. Adam Crain, Sergey Bratus. Bolt-On Security Extensions for Industrial Control System Protocols: A Case Study of DNP3 SAv5
80 -- 83Angela Sasse. Scaring and Bullying People into Security Won't Work
84 -- 86Jonathan Margulies. A Developer's Guide to Audit Logging
88 -- 91Kat Krol, Sören Preibusch. Effortless Privacy Negotiations
92 -- 0Steven M. Bellovin. What a Real Cybersecurity Bill Should Address

Volume 13, Issue 2

3 -- 5Jeremy Epstein. The Whole Is Less than the Sum of the Parts
7 -- 10Gary McGraw. Silver Bullet Talks with Whitfield Diffie
12 -- 13Terry Benzel. An Enduring Symposium for Leading Research in Security and Privacy
14 -- 21Sai Teja Peddinti, Aleksandra Korolova, Elie Bursztein, Geetanjali Sampemane. Understanding Sensitivity by Analyzing Anonymity [Guest editor's introduction]
22 -- 29Susan Hohenberger, Steven Myers, Rafael Pass, Abhi Shelat. An Overview of ANONIZE: A Large-Scale Anonymous Survey System
30 -- 37Per Larsen, Stefan Brunthaler, Michael Franz. Automatic Software Diversity
38 -- 46Zongwei Zhou, Miao Yu, Virgil D. Gligor. Dancing with Giants: Wimpy Kernels for On-Demand I/O Isolation
48 -- 55Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, Radu Sion. Introspections on the Semantic Gap
56 -- 64Mike Bond, Marios O. Choudary, Steven J. Murdoch, Sergei P. Skorobogatov, Ross J. Anderson. Be Prepared: The EMV Preplay Attack
65 -- 74Vincent Lenders, Axel Tanner, Albert Blarer. Gaining an Edge in Cyberspace with Advanced Situational Awareness
75 -- 80Melissa Dark, Jelena Mirkovic. Evaluation Theory and Practice Applied to Cybersecurity Education
81 -- 83Graham Steel. Automated Proof and Flaw-Finding Tools in Cryptography
84 -- 88Budi Arief, Mohd Azeem Bin Adzmi. Understanding Cybercrime from Its Stakeholders' Perspectives: Part 2-Defenders and Victims
89 -- 93Wojciech Mazurczyk, Luca Caviglione. Information Hiding as a Challenge for Malware Detection
94 -- 98Sean W. Smith, John S. Erickson. Never Mind Pearl Harbor-What about a Cyber Love Canal?
99 -- 102Michael Lesk. Safety Risks-Human Error or Mechanical Failure?: Lessons from Railways
103 -- 107Frederik Zuiderveen Borgesius. Informed Consent: We Can Do Better to Defend Privacy
108 -- 0Bruce Schneier. The Security Value of Muddling Through

Volume 13, Issue 1

3 -- 5Bill G. Horne. Umbrellas and Octopuses
7 -- 11Gary McGraw. Silver Bullet Talks with Brian Krebs
12 -- 13Hilarie Orman, Charles P. Pfleeger. Mathematics and Physics Build a New Future for Secure Communication [Guest editors' introduction]
14 -- 21Wade Trappe, Richard E. Howard, Robert S. Moore. Low-Energy Security: Limits and Opportunities in the Internet of Things
22 -- 29David W. Archer, Kurt Rohloff. Computing with Data Privacy: Steps toward Realization
30 -- 40Logan O. Mailloux, Michael R. Grimaila, Douglas D. Hodson, Gerald Baumgartner, Colin McLaughlin. Performance Evaluations of Quantum Key Distribution System Architectures
41 -- 48Ioana Boureanu, Serge Vaudenay. Challenges in Distance Bounding
49 -- 56Mark T. Maybury. Toward the Assured Cyberspace Advantage: Air Force Cyber Vision 2025
57 -- 60Ricardo Padilha, Fernando Pedone. Confidentiality in the Cloud
61 -- 65Melissa Dark. Thinking about Cybersecurity
66 -- 70Emil Simion. The Relevance of Statistical Tests in Cryptography
71 -- 76Budi Arief, Mohd Azeem Bin Adzmi, Thomas Gross. Understanding Cybercrime from Its Stakeholders' Perspectives: Part 1-Attackers
77 -- 79Rahul Telang. Policy Framework for Data Breaches
80 -- 0Daniel E. Geer. Less Is More: Saving the Internet from Itself