-
Front Cover IEEE Secur. Priv. (IF 2.04) Pub Date : 2021-01-26
Presents the front cover for this issue of the publication.
-
-
Table of Contents IEEE Secur. Priv. (IF 2.04) Pub Date : 2021-01-26
Presents the table of contents for this issue of the publication.
-
Masthead IEEE Secur. Priv. (IF 2.04) Pub Date : 2021-01-26
Presents a listing of the editorial board, board of governors, current staff, committee members, and/or society editors for this issue of the publication.
-
Reflections on the Past, Perspectives on the Future [From the Editors] IEEE Secur. Priv. (IF 2.04) Pub Date : 2021-01-26 Sean Peisert
Presents the introductory editorial for this issue of the publication.
-
-
Requirements for Security, Privacy, and Trust in the Internet of Things [Guest Editors' Introduction] IEEE Secur. Priv. (IF 2.04) Pub Date : 2021-01-26 Sabah Mohammed; Tai-hoon Kim; Wai Chi Fang
The articles in this special section focus on system requirements for security, privacy, and trust for the Internet of Things (IoT). IoT has huge potential to push monitoring, computing, and communication deeply into the home, the workplace, medicine, manufacturing, and critical infrastructure. This increased capability offers the hope that urban settings can be transformed in various ways through
-
Message from IEEE S&P's Outgoing Editor in Chief IEEE Secur. Priv. (IF 2.04) Pub Date : 2021-01-26 David M. Nicol
Presents a message from the outgoing Editor in Chief.
-
Special Issue on Security and Privacy Issues of Home Globalization IEEE Secur. Priv. (IF 2.04) Pub Date : 2021-01-26
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers.
-
IEEE Annals of the History of Computing IEEE Secur. Priv. (IF 2.04) Pub Date : 2021-01-26
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers.
-
IEEE Computer Graphics and Applications IEEE Secur. Priv. (IF 2.04) Pub Date : 2021-01-26
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers.
-
IEEE Computing Society Call for Papers IEEE Secur. Priv. (IF 2.04) Pub Date : 2021-01-26
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers.
-
IEEE IT Professional Call for Articles IEEE Secur. Priv. (IF 2.04) Pub Date : 2021-01-26
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers.
-
Detecting Spying Drones IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-11-24 Raz Ben Netanel; Ben Nassi; Adi Shamir; Yuval Elovici
We suggest a method to determine whether a passing drone is used for spying or not. It can be used to detect spying drones when the victim is in a house or driving a car.
-
IEEE Pervasive Computing Call for Articles IEEE Secur. Priv. (IF 2.04) Pub Date : 2021-01-26
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers.
-
Calculating Risks: Understanding the 2020 Election Experience and Defining the "New Normal" IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-12-14 David Mussington
The 2020 election revealed the interdependence of election systems and the risk management challenges of decentralization. Future risk management will need an update to deal with new threats, both complexity and adversary driven.
-
IEEE Transactions on Big Data IEEE Secur. Priv. (IF 2.04) Pub Date : 2021-01-26
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers.
-
Are We Preparing Students to Build Security In? A Survey of European Cybersecurity in Higher Education Programs [Education] IEEE Secur. Priv. (IF 2.04) Pub Date : 2021-01-26 Nicola Dragoni; Alberto Lluch Lafuente; Fabio Massacci; Anders Schlichtkrull
We present a review of European master of science programs in cybersecurity and reflect on the presence (and lack) of knowledge and skills needed to build security in.
-
IEEE Transactions on Sustainable Computing IEEE Secur. Priv. (IF 2.04) Pub Date : 2021-01-26
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers.
-
IEEE Open Journal of the Computer Society IEEE Secur. Priv. (IF 2.04) Pub Date : 2021-01-26
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers.
-
Dealing With COVID-19 Network Traffic Spikes [Cybercrime and Forensics] IEEE Secur. Priv. (IF 2.04) Pub Date : 2021-01-26 Mahmoud Said Elsayed; Nhien-An Le-Khac; Anca Delia Jurcut
The novel severe acute respiratory syndrome coronavirus 2 and its associated disease, COVID-19, have increased the amount of time that people spend working from home and in social isolation. In 2020, the number of users worldwide who relied on the Internet for work, education, and entertainment increased significantly. This growth is causing a substantial rise in bandwidth usage, with a sudden spike
-
Whack-a-Meltdown: Microarchitectural Security Games [Systems Attacks and Defenses] IEEE Secur. Priv. (IF 2.04) Pub Date : 2021-01-26 Daniel Genkin; Yuval Yarom
In early 2018, the disclosure of Spectre1 and Meltdown2 exposed the security risks inherent in speculative and out-of-order execution, which were hitherto considered harmless and valuable performance optimizations. In a nutshell, these attacks demonstrated that transient execution, where the computer executes code speculatively before reverting execution, leaves side effects on the microarchitecture
-
The Challenges of Software Cybersecurity Certification [Building Security In] IEEE Secur. Priv. (IF 2.04) Pub Date : 2021-01-26 Jose L. Hernandez-Ramos; Sara N. Matheu; Antonio Skarmeta
In 2019, the new European Union (EU) cybersecurity regulation "Cybersecurity Act" ("CSA")1 entered into force to create a common framework for the certification of any information and communication technology (ICT) system, including products, services, and processes. The main purpose of this framework is to reduce the current fragmentation of cybersecurity certification schemes2 as well as to increase
-
Errata IEEE Secur. Priv. (IF 2.04) Pub Date : 2021-01-26
Presents corrections to biographical data in in the article,“Forensic event analysis: From seemingly unrelated data to understanding,” (Padhilha, R., et al), IEEE Security Privacy, vol. 18, no. 6, pp. 23–31, Nov./Dec. 2020. doi: 10.1109/MSEC.2020.3000446.
-
IEEE Computer Society Information IEEE Secur. Priv. (IF 2.04) Pub Date : 2021-01-26
Presents a listing of the editorial board, board of governors, current staff, committee members, and/or society editors for this issue of the publication.
-
IEEE Computer Society Member Benefits IEEE Secur. Priv. (IF 2.04) Pub Date : 2021-01-26
Advertisement.
-
Reproducibility: Buy Low, Sell High IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-09-23 Roy Maxion
Are papers in computer security reproducible? The health of the reproducibility culture in a subfield of security biometrics was assessed in a reproducibility audit of all papers published in the first quarter of 2020. Many papers met some reproducibility criteria, but none met them all. Even in a culture of faster, better, cheaper, reproducibility needn't cost much, but its benefits can be substantial
-
Courseware as Code: Instituting Agile Courseware Collaboration IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-11-03 Julianna M. Rodriguez; Benjamin J. Allison; Christopher W. Apsey; Todd M. Boudreau
In 2014, the Secretary and Chief of Staff of the Army established the Cyber branch and the U.S. Army Cyber School (USACyS). Quickly building USACyS from scratch required building courseware to fill workforce-oriented curricula. Before we could finish creating sufficient and suitable content, the Army assigned students and scheduled classes. As we worked rapidly to create content, we turned to cloud-hosted
-
IEEE IT Professional Call For Articles IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-11-03
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers.
-
IEEE Computer Society Information IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-11-03
Presents a listing of the editorial board, board of governors, current staff, committee members, and/or society editors for this issue of the publication.
-
-
Front Cover IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-10-30
Presents the front cover for this issue of the publication.
-
IEEE Open Access journal of the Computer Society IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-10-30
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers.
-
Table of Contents IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-10-30
Presents the table of contents for this issue of the publication.
-
Masthead IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-10-30
Presents a listing of the editorial board, board of governors, current staff, committee members, and/or society editors for this issue of the publication.
-
Cybersecurity During COVID-19 IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-10-30 Phyllis A. Schneck
Presents the introductory editorial for this issue of the publication.
-
Reliability Society IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-10-30
Presents a listing of the editorial board, board of governors, current staff, committee members, and/or society editors for the Reliability Society.
-
IEEE Computer Society Call for Papers IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-10-30
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers.
-
A Self-Healing Mechanism for Internet of Things Devices IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-09-07 Guy Amit; Asaf Shabtai; Yuval Elovici
Rapidly identifying attacks and selecting and applying appropriate remediation represent a significant challenge for mitigating cyberattacks on Internet of Things devices. We present a novel self-healing framework that collaboratively trains a neural network-based remediation selection agent to recover from malfunctions and cyberattacks automatically.
-
Front Cover IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-09-03
Presents the front cover for this issue of the publication.
-
Table of Contents IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-09-03
Presents the table of contents for this issue of the publication.
-
Masthead IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-09-03
Presents a listing of the editorial board, board of governors, current staff, committee members, and/or society editors for this issue of the publication.
-
Blockchains and Stealth Tactics for Teaching Security IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-09-03 Paul C. van Oorschot
Presents the introductory editorial for this issue of the publication.
-
Reliability Society IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-09-03
Presents a listing of the editorial board, board of governors, current staff, committee members, and/or society editors for this issue of the publication.
-
Confronting the Limitations of Hardware-Assisted Security IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-09-03 Mohammad Mannan; N. Asokan
The articles in this special section focus on hardware assisted security systems. During the past two decades, the use of hardware assistance for improving security and privacy has been steadily increasing. In particular, hardware-assisted trusted execution environments (TEEs), such as Arm TrustZone and Intel Software Guard Extensions, are now widely deployed. This has led to many new initiatives in
-
IEEE Transactions on Sustainable Computing IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-09-03
Advertisement.
-
IEEE Annals of the History of Computing IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-09-03
Advertisement.
-
IEEE Computer Graphics & Applications IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-09-03
Advertisement.
-
IEEE Computer Society Call for Papers IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-09-03
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers.
-
IEEE IT Professional Call for Articles IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-09-03
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers.
-
Preparing America's Cyber Intelligence Workforce IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-09-03 Randy Borum; Ron Sanders
Cyber intelligence requires analytic and technical skills. It is a pillar of U.S. national security and is needed in the private sector. We outline a framework for cyber intelligence education, including a dual-track model to balance the technical and analytic requirements.
-
IEEE Pervasive Computing Call for Articles IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-09-03
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers.
-
Built-In Cybersecurity: Insights Into Product Security for Cyberphysical Systems at a Large Company IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-09-03 Kenneth G. Crowther; Brian Rust
Security flaws in cyberphysical systems are expensive. The key to creating secure but affordable industrial cyber systems is to understand the various points at which security can be implemented to build security into a product. This article is written from the perspective of a practitioner and addresses several components of product security that work together to build security into cyberphysical
-
Hacking the Tax Code IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-09-03 Bruce Schneier
The tax code isn’t software. It doesn’t run on a computer. But it’s still code. It’s a series of algorithms that takes an input— financial information for the year—and produces an output: the amount of tax owed. It’s incredibly complex code; there are a bazillion details and exceptions and special cases. It consists of government laws, rulings from the tax authorities, judicial decisions, and legal
-
IEEE Computer Society Information IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-09-03
Presents a listing of the editorial board, board of governors, current staff, committee members, and/or society editors for this issue of the publication.
-
-
Privacy Regulations, Smart Roads, Blockchain, and Liability Insurance: Putting Technologies to Work IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-09-02 Lelio Campanile; Mauro Iacono; Alexander H. Levis; Fiammetta Marulli; Michele Mastroianni
Smart streets promise widely available traffic information to help improve people's safety. Unfortunately, gathering that data may threaten privacy. We describe an architecture that exploits a blockchain and the Internet of Vehicles and show its compliance with the General Data Protection Regulation.
-
Security for Shared Electric and Automated Mobility Services in Smart Cities IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-08-26 Binod Vaidya; Hussein T. Mouftah
Shared electric and automated mobility (SEAM) is a complementary feature of urban mobility in smart cities. This article highlights cybersecurity for SEAM, including peer-to-peer car sharing, and presents security solutions based on conjugated authentication and authorization.
-
It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-08-24 Rock Stevens; Josiah Dykstra; Wendy Knox Everette; Michelle L. Mazurek
Compliance programs help protect organizations' intellectual property and valuable resources through mandated security controls; however, organizations often conflate compliance with strong security. Understanding the security gaps that place fully compliant organizations at risk is essential.
-
Security and Privacy in Internet of Things-Enabled Smart Cities: Challenges and Future Directions IEEE Secur. Priv. (IF 2.04) Pub Date : 2020-08-12 Jose L. Hernandez-Ramos; Juan A. Martinez; Vincenzo Savarino; Marco Angelini; Vincenzo Napolitano; Antonio F. Skarmeta; Gianmarco Baldini
The digitalization of current urban spaces is realizing the vision of so-called smart cities, where security and privacy concerns could affect citizens' safety. This work discusses potential solutions derived from European Union research efforts to be considered in the coming years.
Contents have been reproduced by permission of the publishers.