IEEE Security & Privacy

Papers
(The median citation count of IEEE Security & Privacy is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Publications Seek 2025 Editors in Chief41
IEEE Security & Privacy Subscribe40
Trust Me, I’m a Liar40
Front Cover32
Masthead32
Differential Privacy, Firm-Level Data, and the Binomial Pathology31
Cross-Architecture Binary Function Fingerprinting28
IEEE Computer Society Has You Covered!27
Excerpts From the New Dictionary of Cybersecurity, 203626
IEEE Author's Choice25
Software Liability Came to Europe24
Masthead24
IEEE Computing in Science and Engineering21
Front Cover19
IEEE Computer Society Benefits18
IEEE Computer Society Call for Papers18
Cyber Hard Problems: The Next Generation [From the Editors]15
Table of Contents14
Narrowing the Software Supply Chain Attack Vectors: The SSDF Is Wonderful but not Enough14
IEEE Intelligent Systems14
An Analysis of European Union Cybersecurity Higher Education Programs Through the Crowd-Sourced Database CyberHEAD14
Reliability Society13
Privacy-Preserving Machine Learning [Cryptography]13
IEEE Volunteer Service Awards13
IEEE Transactions on Computers13
IEEE Emerging Technologies13
Inside the Windows Security Push: A Twenty-Year Retrospective12
Differential Performance and Contextual Integrity in Speech Privacy12
Dissecting the Industrial Control Systems Software Supply Chain11
IEEE Computing edge11
Trusting Trust: Humans in the Software Supply Chain Loop11
Electric Sheep on the Pastures of Disinformation and Targeted Phishing Campaigns: The Security Implications of ChatGPT11
Global Cybercrime Requires a Collective Response: Are We Prepared to Ban Ransom Payments?11
Securing Networks with Programmable Data Planes: Opportunities and Challenges10
IEEE Transactions on Sustainable Computing10
Security and Privacy Research Artifacts: Are We Making Progress?10
IEEE Pervasive Computing: Call for Articles10
The Dual Role of Machine Learning in Data Anonymization: Top 10 Benefits and Risks10
IEEE Computer Society Information10
What’s Driving Conflicts Around Differential Privacy for the U.S. Census9
IEEE Computer Society Benefits9
Sovereignty in the Digital Era: The Quest for Continuous Access to Dependable Technological Capabilities9
IEEE Computer Society Call for Papers9
The Holy Grail of Vulnerability Predictions9
IEEE Career Center9
IEEE Computing Edge8
IEEE Job Boards8
IEEE Annals filler8
IEEE Career Center8
High Assurance in the Twenty-First Century With Roger Schell8
Data Acquisition Framework for Micromobility Vehicles Toward Driving Risk Prediction Against Cyberphysical Security Attack7
The Our Reality Privacy Policy7
Unusable Security for Attackers [From the Editors]7
In Pursuit of Aviation Cybersecurity: Experiences and Lessons From a Competitive Approach7
Words Become SQL: Securing AI Assistants That Talk to Databases7
To Trust or Not To Trust7
IEEE Computer Society Has You Covered!7
IEEE Emerging Technologies7
Front Cover7
IEEE Multimedia6
IEEE Computer Society Information6
IEEE Computer Society Information6
IEEE Computer Society: Call for Papers6
Inclusive Internet of Things Privacy Labels6
Empower New Code Citizens to Reflect and Communicate on Code Security6
Learning-Based Internet of Things Honeypots for Cyber Deception6
The Buffet Overflow Café6
IEEE Computer Society Benefits6
IEEE Transactions on Privacy6
Watts S. Humphrey Software Quality Award Nominations6
IEEE Computing Edge6
IEEE Computer Society Diversity and Inclusion Fund6
I See You: Using RF Signals to See Inside Manufacturing Processes6
Reliability Society6
Get Published in the New IEEE Open Journal of the Computer Society6
Software Development and the Near-Ubiquitous Acceptance of Mystery Meat6
Masthead6
IEEE Computer Society Information5
Why Is Johnny Getting Groomed in Roblox?5
Table of Contents5
Table of Contents5
The Double Burden of Moderators: Safeguarding Communities While Facing Identity-Based Harassment5
Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures5
Computing Edge5
Regulatory Contextual Integrity: Adaptively Regulating Privacy as Contextual Integrity5
Lowering the Bar: How Large Language Models Can be Used as a Copilot by Hardware Hackers5
IEEE Computer Society Information5
IEEE Transactions on Computers5
Impact of Emerging Hardware on Security and Privacy4
IEEE Career Center4
Front Cover4
IEEE Computer Society Benefits4
IEEE Computer Society Call for Papers4
Adapting a Publicly Focused Individual Health-Care Model to Cybersecurity4
Table of Contents4
Front Cover4
IEEE Transactions on Sustainable Computing4
Power in Computer Security and Privacy: A Critical Lens4
Front Cover4
IEEE Computing Edge4
Front Cover4
OpenSSF Scorecard: On the Path Toward Ecosystem-Wide Automated Security Metrics4
IEEE Open Journal of the Computer Society4
Copycat Crimes: Characterizing Code Reuse in the Mobile Android Stalkerware Ecosystem3
IEEE Career Center3
We Need a “Building Inspector for IoT” When Smart Homes Are Sold3
Hardware Security in the Era of Emerging Device and System Technologies3
Embedding Privacy Into Design Through Software Developers: Challenges and Solutions3
Synthetic Realities and Artificial Intelligence-Generated Contents3
IEEE Security & Privacy Subscribe filler3
Computing Edge3
Obstacles to Practical Supply Chain Risk Management for Digital Components3
Migrating C to Rust for Memory Safety3
Reconfigurable Digital Twin to Support Research, Education, and Training in the Defense of Critical Infrastructure3
What Has Artifact Evaluation Ever Done for Us?3
Shockvertising, Malware, and a Lack of Accountability: Exploring Consumer Risks of Virtual Reality Advertisements and Marketing Experiences3
IEEE Computer Society CFP filler3
IEEE Jobs Board3
Masthead3
Securing Bystander Privacy in Mixed Reality While Protecting the User Experience3
IEEE Computer Society Information3
Reliability Society2
Enhancing Security Testing for Identity Management Implementations: Introducing Micro-Id-Gym Language and Micro-Id-Gym Testing Tool2
IEEE Career Center2
IEEE Computer Science and Engineering Awards2
The Rise of Miniapps: A New Frontier with Security Challenges in Mobile Apps2
The Amplification of Online Deviancy Through the Language of Violent Crime, War, and Aggression2
IEEE Computer Society Benefits2
IEEE Computing Edge2
What Do We Owe?2
IEEE Volunteer Service Awards2
Masthead2
Challenges of Producing Software Bill of Materials for Java2
Memory Safety2
Large Language Models and Security2
Contextual Integrity, Explained: A More Usable Privacy Definition2
IEEE Career Center2
Current Perspectives on Securing Critical Infrastructures’ Supply Chains2
A Real-Time Cosimulation Testbed for Electric Vehicle Charging and Smart Grid Security2
Usable Security and Privacy for Security and Privacy Workers2
IEEE Computer Society Member Benefits2
Masthead2
On Bridges and Software2
Human Versus Machine: A Comparative Analysis in Detecting Artificial Intelligence-Generated Images2
IEEE Transactions on Privacy2
Front Cover2
Table of Contents2
IEEE Annals of the History of Computing1
Delta Security Certification for Software Supply Chains1
Whither Software?1
Reliability Society1
IEEE Computing in Science and Engineering1
Real-World Security Protocols1
Online Log Data Analysis With Efficient Machine Learning: A Review1
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription1
A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda1
{In Earth} Until (Ready)1
The Persistent Problem of Software Insecurity1
IEEE tbd filler1
Secure Access Service Edge Convergence: Recent Progress and Open Issues1
On Data Licenses for Open Source Threat Intelligence1
Masthead1
IEEE Transactions on Big Data1
Sphynx: A Deep Neural Network Design for Private Inference1
A Viewpoint: Harmonizing the Diverse Memory Safety Fronts1
The Need of Testbeds for Cyberphysical System Security1
Computing Edge1
Security and Privacy in the Metaverse1
Unleashing Malware Analysis and Understanding With Generative AI1
PURE Biomanufacturing: Secure, Pandemic-Adaptive Biomanufacturing1
Side-Channel Attacks: A Short Tour1
IEEE Computing Edge1
Table of Contents1
Reliability Society1
Masthead1
IEEE Open Journal of the Computer Society1
Computing on Encrypted Data1
IEEE Computer Society1
Toward Common Weakness Enumerations in Industrial Control Systems1
Masthead1
IEEE Computer Society Information1
Table of Contents1
Why Is Static Application Security Testing Hard to Learn?1
IEEE Computer Society Has You Covered1
IEEE Computer Society Benefits1
Do You Speak Cyber? Talking Security With Developers of Health Systems and Devices1
Convergence: Ongoing1
Cybersecurity in Tactical Edge Networks1
Masthead1
Data Privacy and Trustworthy Machine Learning1
IEEE CS CFP filler1
IEEE Security and Privacy Subscription1
Eight Lightweight Usable Security Principles for Developers1
Security Policy as Code1
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware1
IEEE Reliability Society1
IEEE Trans Sustainable Comp filler0
Securing Code: A View on the Cultural Aspects of Resilience0
The Path to Powerful Quantum Computers0
IEEE Computer Society Information0
Security Requirements and Secure Software Design0
IEEE Security and Privacy Subscribe0
IEEE Author’s Choice0
IEEE IT Professionals Call for Articles0
Table of Contents0
Protecting Cryptographic Libraries Against Side-Channel and Code-Reuse Attacks0
Disinformation and Reflections From Usable Security0
Large Language Models for Cybersecurity: New Opportunities0
Building Trustworthy AI Agents0
IEEE Computing Edge0
Trustworthy AI Means Public AI [Last Word]0
Back in the Game: Privacy Concerns of Second-Hand Game Consoles0
What I’ve Learned0
IEEE Security and Privacy Magazine Subscribe0
Masthead0
On Software Infrastructure: Develop, Prove, Profit?0
Cybercrime and Online Harms0
IEEE Job Boards0
Digital Twin Security: A Perspective on Efforts From Standardization Bodies0
Security as an Artificial Science, System Administration, and Tools0
Table of Contents0
IEEE OJ Computer Society filler0
Secure by Design for Everyone0
Reliability Society0
The Rise of Cybercrime and Cyber-Threat Intelligence: Perspectives and Challenges From Law Enforcement0
Exploring Public Attitudes on Technology-Facilitated Intimate Partner Violence0
IEEE CS Job Boards0
Threat Modeling Tools: A Taxonomy0
Developing With Formal Methods at BedRock Systems, Inc.0
Software Bills of Materials Are Required. Are We There Yet?0
Phishing Detection Leveraging Machine Learning and Deep Learning: A Review0
Perceptual Hash Inversion Attacks on Image-Based Sexual Abuse Removal Tools0
IEEE CGA0
Software Security Is Your Highest Priority. Do Your Developers Know That?0
IEEE Computing Edge0
Deepfake Detection in Super-Recognizers and Police Officers0
Contextualizing Formal Verification for Systems Security Engineering0
The Future of Digital Investigation: Automated Legal Inference0
A Viewpoint: Safer Heaps With Practical Architectural Security Primitives0
IEEE Transactions on Sustainable Computing0
IEEE Computer Society Career Center0
Table of Contents0
NIST’s Post-Quantum Cryptography Standards Competition0
How Are Industrial Control Systems Insecure by Design? A Deeper Insight Into Real-World Programmable Logic Controllers0
Journey to the Center of Software Supply Chain Attacks0
IEEE Emerging Technologies0
IEEE Pervasive Computing0
Decentralized Public-Key Infrastructure With Blockchain in V2X Communications: Promising or Only Euphoria?0
Masthead0
Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols0
0.10662007331848