IEEE Security & Privacy

Papers
(The median citation count of IEEE Security & Privacy is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Trust Me, I’m a Liar60
Excerpts From the New Dictionary of Cybersecurity, 203632
Masthead28
Publications Seek 2025 Editors in Chief28
IEEE Computer Graphics and Applications27
IEEE Security & Privacy Subscribe26
[Front cover]25
Front Cover24
Cross-Architecture Binary Function Fingerprinting22
IEEE Computer Society Has You Covered!21
Differential Privacy, Firm-Level Data, and the Binomial Pathology19
The Practices and Challenges of Generating Nonidentifiable Data18
IEEE Author's Choice18
IEEE Computer Society Call for Papers17
Open Source and Trust17
Masthead16
IEEE Computing in Science and Engineering15
Front Cover15
IEEE Transactions on Big Data14
IEEE JobSite14
IEEE Pervasive Computing Call For Articles14
Electric Sheep on the Pastures of Disinformation and Targeted Phishing Campaigns: The Security Implications of ChatGPT13
IEEE Transactions on Computers12
Privacy-Preserving Machine Learning [Cryptography]11
Inside the Windows Security Push: A Twenty-Year Retrospective11
Narrowing the Software Supply Chain Attack Vectors: The SSDF Is Wonderful but not Enough11
Trusting Trust: Humans in the Software Supply Chain Loop11
IEEE Intelligent Systems11
An Analysis of European Union Cybersecurity Higher Education Programs Through the Crowd-Sourced Database CyberHEAD11
Cyber Hard Problems: The Next Generation [From the Editors]10
Dissecting the Industrial Control Systems Software Supply Chain10
IEEE Computer Society Benefits10
Table of Contents10
They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web9
IEEE Computing edge9
Citizens’ Cybersecurity Behavior: Some Major Challenges8
Global Cybercrime Requires a Collective Response: Are We Prepared to Ban Ransom Payments?8
The Dual Role of Machine Learning in Data Anonymization: Top 10 Benefits and Risks8
The Holy Grail of Vulnerability Predictions8
Security and Privacy Research Artifacts: Are We Making Progress?8
IEEE Computer Society Information8
Sovereignty in the Digital Era: The Quest for Continuous Access to Dependable Technological Capabilities8
What’s Driving Conflicts Around Differential Privacy for the U.S. Census8
IEEE Pervasive Computing: Call for Articles8
IEEE Transactions on Sustainable Computing8
IEEE IT Professional Call for Articles7
Unusable Security for Attackers [From the Editors]7
The Our Reality Privacy Policy7
IEEE Annals filler7
IEEE Computing Edge7
High Assurance in the Twenty-First Century With Roger Schell7
IEEE Job Boards7
To Trust or Not To Trust6
IEEE Career Center6
Reliability Society6
Data Acquisition Framework for Micromobility Vehicles Toward Driving Risk Prediction Against Cyberphysical Security Attack6
IEEE Computer Society Has You Covered!6
In Pursuit of Aviation Cybersecurity: Experiences and Lessons From a Competitive Approach6
IEEE Computing Edge6
IEEE Multimedia5
Empower New Code Citizens to Reflect and Communicate on Code Security5
Masthead5
IEEE Computer Society Diversity and Inclusion Fund5
Incident Response as a Lawyers’ Service5
IEEE Pervasive Computing Call for Articles5
IEEE Computing Edge5
IEEE Computer Society Information5
A First Look at Zoombombing5
The Buffet Overflow Café4
Watts S. Humphrey Software Quality Award Nominations4
Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures4
Computing Edge4
What Has Artifact Evaluation Ever Done for Us?4
IEEE Computer Graphics and Applications4
IEEE Computer Society Member Benefits4
The Double Burden of Moderators: Safeguarding Communities While Facing Identity-Based Harassment4
Get Published in the New IEEE Open Journal of the Computer Society4
IEEE Computer Society Benefits4
IEEE Computer Society: Call for Papers4
IEEE Transactions on Computers4
Impact of Emerging Hardware on Security and Privacy4
IEEE Diversity and Inclusion Fund4
IEEE Computing in Science & Engineering4
Why Is Johnny Getting Groomed in Roblox?4
Software Development and the Near-Ubiquitous Acceptance of Mystery Meat4
Inclusive Internet of Things Privacy Labels4
IEEE Computer Society Information4
Nudging Software Developers Toward Secure Code4
Synthetic Realities and Artificial Intelligence-Generated Contents4
Adapting a Publicly Focused Individual Health-Care Model to Cybersecurity4
IEEE Computer Society Diversity and Integrity Fund4
Front Cover4
Embedding Privacy Into Design Through Software Developers: Challenges and Solutions3
Equity and Privacy: More Than Just a Tradeoff3
IEEE Computing Edge3
Table of Contents3
Migrating C to Rust for Memory Safety3
IEEE Security & Privacy Subscribe filler3
Reliability Society3
Power in Computer Security and Privacy: A Critical Lens3
Hardware Security in the Era of Emerging Device and System Technologies3
IEEE Computer Society Information3
Front Cover3
IEEE Career Center3
Table of Contents3
Table of Contents3
Reconfigurable Digital Twin to Support Research, Education, and Training in the Defense of Critical Infrastructure3
IEEE Computer Society CFP filler3
IEEE Career Center3
Securing Bystander Privacy in Mixed Reality While Protecting the User Experience3
IEEE Computer Society Benefits3
Front Cover3
Front Cover3
IEEE Transactions on Sustainable Computing3
OpenSSF Scorecard: On the Path Toward Ecosystem-Wide Automated Security Metrics3
IEEE Annals of the History of Computing3
IEEE Computer Society Call for Special issue Proposals3
Copycat Crimes: Characterizing Code Reuse in the Mobile Android Stalkerware Ecosystem3
Shockvertising, Malware, and a Lack of Accountability: Exploring Consumer Risks of Virtual Reality Advertisements and Marketing Experiences3
IEEE Career Center2
IEEE Computing Edge2
The State of the Art in Integer Factoring and Breaking Public-Key Cryptography2
Enhancing Security Testing for Identity Management Implementations: Introducing Micro-Id-Gym Language and Micro-Id-Gym Testing Tool2
We Need a “Building Inspector for IoT” When Smart Homes Are Sold2
A Real-Time Cosimulation Testbed for Electric Vehicle Charging and Smart Grid Security2
IEEE Computer Society Member Benefits2
The Amplification of Online Deviancy Through the Language of Violent Crime, War, and Aggression2
Front Cover2
Reliability Society2
Certificate Transparency in Google Chrome: Past, Present, and Future2
Usable Security and Privacy for Security and Privacy Workers2
Masthead2
Current Perspectives on Securing Critical Infrastructures’ Supply Chains2
What Do We Owe?2
Delta Security Certification for Software Supply Chains2
An Informative Security and Privacy “Nutrition” Label for Internet of Things Devices2
Table of Contents2
Toward Fail Safety for Security Decisions2
Computing Edge2
IEEE Jobs Board2
Challenges of Producing Software Bill of Materials for Java2
Memory Safety2
On Bridges and Software2
Table of Contents1
A Viewpoint: Harmonizing the Diverse Memory Safety Fronts1
Masthead1
IEEE Computing in Science and Engineering1
Online Log Data Analysis With Efficient Machine Learning: A Review1
Masthead1
Large Language Models and Security1
The Need of Testbeds for Cyberphysical System Security1
IEEE Annals of the History of Computing1
Opportunities and Challenges in Securing Critical Infrastructures Through Cryptography1
Human Versus Machine: A Comparative Analysis in Detecting Artificial Intelligence-Generated Images1
IEEE CS CFP filler1
A Maturity Spectrum for Data Institutions1
Masthead1
Why Is Static Application Security Testing Hard to Learn?1
IEEE Computer Society1
Whither Software?1
IEEE Annals of the History of Computing1
IEEE Jobs Board1
IEEE tbd filler1
{In Earth} Until (Ready)1
IEEE Career Center1
Masthead1
IEEE Annals of the History of Computing1
Integrating Cybersecurity and Artificial Intelligence Research in Engineering and Computer Science Education1
IEEE Computer Society Has You Covered1
IEEE Open Journal of the Computer Society1
On Data Licenses for Open Source Threat Intelligence1
Computing on Encrypted Data1
Security Policy as Code1
IEEE Computer Society Information1
Security and Privacy in the Metaverse1
Computing Edge1
Table of Contents1
ComputingEdge1
IEEE Reliability Society1
Contextual Integrity, Explained: A More Usable Privacy Definition1
Do You Speak Cyber? Talking Security With Developers of Health Systems and Devices1
Masthead1
Side-Channel Attacks: A Short Tour1
Reliability Society1
Unleashing Malware Analysis and Understanding With Generative AI1
Sphynx: A Deep Neural Network Design for Private Inference1
IEEE Transactions on Sustainable Computing1
Eight Lightweight Usable Security Principles for Developers1
Reliability Society0
Hot Topics in Security and Privacy Standardization at the IETF and Beyond0
Medical Device Forensics0
IEEE Pervasive Computing0
IEEE Annals of the History of Computing0
IEEE Computer Society Elections0
Digital Twin Security: A Perspective on Efforts From Standardization Bodies0
IEEE Security and Privacy Subscribe0
On Software Infrastructure: Develop, Prove, Profit?0
IEEE Annals of the History of Computing0
The Rise of Cybercrime and Cyber-Threat Intelligence: Perspectives and Challenges From Law Enforcement0
CLARK: A Design Science Research Project for Building and Sharing High-Quality Cybersecurity Curricula0
Threat Modeling Tools: A Taxonomy0
IEEE Open Journal of the Computer Society0
IEEE Computer Society Member Benefits0
Masthead0
NIST’s Post-Quantum Cryptography Standards Competition0
Disinformation and Reflections From Usable Security0
Contextualizing Formal Verification for Systems Security Engineering0
Perceptual Hash Inversion Attacks on Image-Based Sexual Abuse Removal Tools0
CHERI: Hardware-Enabled C/C++ Memory Protection at Scale0
Deepfake Detection in Super-Recognizers and Police Officers0
Software Bills of Materials Are Required. Are We There Yet?0
IEEE Computer Society Career Center0
IEEE Computing Edge0
IEEE Computer Society Member Benefits0
IEEE CS Job Boards0
A Viewpoint: Safer Heaps With Practical Architectural Security Primitives0
Personal IoT Privacy Control at the Edge0
Table of Contents0
The Future of Digital Investigation: Automated Legal Inference0
IT Professional: Call for Articles0
IEEE Computing in Science and Engineering0
IEEE Jobs Board0
Reliability Society0
Understanding Similarities and Differences Between Software Composition Analysis Tools0
Table of Contents0
What I’ve Learned0
Computing Edge0
IEEE Author’s Choice0
Software Bill of Materials as a Proactive Defense0
Exploring Public Attitudes on Technology-Facilitated Intimate Partner Violence0
IEEE Computer Society Information0
How Are Industrial Control Systems Insecure by Design? A Deeper Insight Into Real-World Programmable Logic Controllers0
IEEE Job Boards0
IEEE OJ Computer Society filler0
Securing Code: A View on the Cultural Aspects of Resilience0
Security as an Artificial Science, System Administration, and Tools0
Table of Contents0
Decentralized Public-Key Infrastructure With Blockchain in V2X Communications: Promising or Only Euphoria?0
IEEE Open Journal of the Computer Society0
Protecting Cryptographic Libraries Against Side-Channel and Code-Reuse Attacks0
IEEE Pervasive Computing0
Trustworthy AI Means Public AI [Last Word]0
IEEE IT Professional Call for Articles0
IEEE Computer Society Career Center0
Friction Matters: Balancing the Pursuit of Perfect Protection With Target Hardening0
2023 IEEE Computer Society Nomination for Watts S. Humphrey Award0
Journey to the Center of Software Supply Chain Attacks0
IEEE Computer Society Information0
Security Requirements and Secure Software Design0
IEEE Computing Edge0
0.084321022033691