IEEE Security & Privacy

Papers
(The median citation count of IEEE Security & Privacy is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Front Cover52
IEEE Computer Graphics and Applications39
Front Cover24
IEEE Computing Edge23
Masthead23
IEEE Diversity and Inclusion Fund22
IEEE Computer Graphics and Applications21
[Front cover]20
IEEE Computer Society Call for Papers19
IEEE IT Professional Call for Articles19
Reliability Society19
[Front cover]18
Identity15
Supporting Artificial Intelligence/Machine Learning Security Workers Through an Adversarial Techniques, Tools, and Common Knowledge Framework15
IEEE Computing Edge14
Table of Contents14
IEEE Pervasive Computing13
IEEE Computer Society Call for Papers13
Publications Seek 2026 Editors in Chief13
IEEE Computer Society Career Center filler12
IEEE Transaction on Privacy12
Front Cover12
Masthead11
IEEE Computer Society Information10
IEEE Annals of the History of Computing10
Computing Edge10
IEEE Software Magazine Call for Articles10
IEEE Transactions on Computers10
A Review of the Privacy-Enhancing Technologies Software Market9
Formal Methods at Scale9
IEEE Computer Society Benefits8
Reliability Society8
Publications Seek 2025 Editors in Chief8
Differential Privacy, Firm-Level Data, and the Binomial Pathology8
IEEE Computer Society Diversity and Integrity Fund7
IEEE Security and Privacy Subscription7
Updates From IEEE Security & Privacy’s Editor-in-Chief Sean Peisert: And Now For Something Completely Different7
IEEE Computer Society Member Benefits7
IEEE Computing in Science and Engineering7
IEEE SP Over the Rainbow filler7
Table of Contents7
The Practices and Challenges of Generating Nonidentifiable Data6
Front Cover6
Table of Contents6
IEEE Open Journal of the Computer Society6
VAULT-Style Risk-Limiting Audits and the Inyo County Pilot6
Masthead6
IEEE Computing in Science & Engineering6
IEEE Security & Privacy Subscribe6
Masthead6
Privacy in the Time of COVID-19: Divergent Paths for Contact Tracing and Route-Disclosure Mechanisms in South Korea5
IEEE Jobs Board5
Welcome to the Latest “Off by One” Column5
Reconfigurable Digital Twin to Support Research, Education, and Training in the Defense of Critical Infrastructure5
[Front cover]5
Front Cover5
Table of Contents5
Reliability Society5
Table of Contents5
IEEE Computer Society Information5
IEEE Computing Edge5
Excerpts From the New Dictionary of Cybersecurity, 20365
IEEE Computer Society Member Benefits5
IEEE Computer Society Information5
Front Cover5
IEEE Computer Society Information4
A Cybersecurity Moonshot4
Taking a Measured Approach to Investing in Information Infrastructure for Attaining Leading-Edge Trustworthy Artificial Intelligence4
Automating Recovery in Mixed Operation Technology/IT Critical Infrastructures4
OpenSSF Scorecard: On the Path Toward Ecosystem-Wide Automated Security Metrics4
Open Source and Trust4
Verify It’s You: How Users Perceive Risk-Based Authentication4
A Decade of Reoccurring Software Weaknesses4
Machine Learning for Source Code Vulnerability Detection: What Works and What Isn’t There Yet4
Beyond Passwords—Challenges and Opportunities of Future Authentication4
IEEE Computers In Science & Engineering4
Understanding the Insecurity of Processor Caches Due to Cache Timing-Based Vulnerabilities4
Understanding the Security Implications of Kubernetes Networking4
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription4
Memory Errors and Memory Safety: C as a Case Study4
What Has Artifact Evaluation Ever Done for Us?4
Real-World Security Protocols3
Convergence: Ongoing3
Shockvertising, Malware, and a Lack of Accountability: Exploring Consumer Risks of Virtual Reality Advertisements and Marketing Experiences3
Impact of Emerging Hardware on Security and Privacy3
Securing Bystander Privacy in Mixed Reality While Protecting the User Experience3
Full Spatial and Temporal Memory Safety for C3
Verifiable Sustainability in Data Centers3
Trust in Data Security Protocols and Knowledge of Privacy and Security Technology3
PURE Biomanufacturing: Secure, Pandemic-Adaptive Biomanufacturing3
Trust Me, I’m a Liar3
Is Cybersecurity Liability a Liability?3
Synthetic Realities and Artificial Intelligence-Generated Contents3
Analyzing Cryptography in the Wild: A Retrospective3
The Data Protection Officer: A Ubiquitous Role That No One Really Knows3
Power in Computer Security and Privacy: A Critical Lens3
Transient Execution Attacks3
Hardware Security in the Era of Emerging Device and System Technologies3
Adapting a Publicly Focused Individual Health-Care Model to Cybersecurity2
Cyberassured Systems Engineering at Scale2
Reliability Society2
IEEE Computer Society Member Benefits2
IEEE JobSite2
IEEE Transactions on Sustainable Computing2
IEEE Computer Society Has You Covered!2
Front Cover2
A Multidisciplinary Look at History and Future of Deepfake With Gartner Hype Cycle2
IEEE Author's Choice2
IEEE Career Center2
IEEE Pervasive Computing Call For Articles2
IEEE Computer Society Information2
CLARK: A Design Science Research Project for Building and Sharing High-Quality Cybersecurity Curricula2
Equity and Privacy: More Than Just a Tradeoff2
Get Published in the New IEEE Transaction on Privacy2
Advocating a Policy Push Toward Inclusive and Secure “Digital-First” Societies2
Table of Contents2
Cross-Architecture Binary Function Fingerprinting2
IEEE Computer Society Call for Special issue Proposals2
IEEE Transactions on Big Data2
IEEE Transactions on Sustainable Computing2
Masthead2
IEEE Career Center2
Embedding Privacy Into Design Through Software Developers: Challenges and Solutions2
IT Professional: Call for Articles2
Migrating C to Rust for Memory Safety2
IEEE Career Center1
01
IEEE Jobs Board1
IEEE Jobs Boards1
IEEE Quantum Week 20221
IEEE Computer Society Call for Papers1
Introducing IEEE Security & Privacy’s “Off by One” Column1
IEEE Job Boards1
IEEE Computer Society1
IEEE Computer Society: Call for Papers1
IEEE Over the Rainbow Podcast1
Certificate Transparency in Google Chrome: Past, Present, and Future1
Computing Edge1
Computing in Science & Engineering1
[Front cover]1
IEEE Computer Society Call for Papers1
Masthead1
Nothing Is Good Enough: Fast and Cheap Are Undervalued as Influencers of Security Tool Adoption1
IEEE Computer Society CFP filler1
IEEE Computing in Science and Engineering1
IEEE Open Journal of the Computer Society1
Masthead1
Welcome to the Latest “Off by One” Column1
Reliability Society1
ACSAC 2020: Furthering the Quest to Tackle Hard Problems and Find Practical Solutions1
IEEE Annals in Computing1
Front Cover1
Front Cover1
IEEE Pervasive Computing Call for Articles1
IEEE Transactions on Computers1
IEEE Computing Edge1
Over the Rainbow Podcast1
IEEE Annals of the History of Computing1
A Call to Reconsider Certification Authority Authorization1
IEEE Security & Privacy Subscribe filler1
Toward Fail Safety for Security Decisions1
IEEE Computer Society Seeks Applicants for Editors in Chief1
IEEE Computer Society Member Benefits1
IEEE Computer Society Member Benefits1
Front Cover1
IEEE Transactions on Big Data1
Front Cover1
A View of Security as 20 Subject Areas in Four Themes1
Masthead1
Dispelling Misconceptions and Characterizing the Failings of Deepfake Detection1
IEEE Computer Society Career Center1
IEEE Reliability Society1
IEEE Computing Edge1
IEEE IT Professional Call for Articles1
IEEE Computer Society Diversity & Inclusion Fund1
IEEE Computer Society Information0
Table of Contents0
Masthead0
The Task Piper0
Front Cover0
IEEE Job Boards0
Privacy Compliance: Can Technology Come to the Rescue?0
Privacy in a Time of COVID-19: How Concerned Are You?0
Masthead0
Lessons Learned From Designing a Security Architecture for Real-World Government Agencies0
“Free” as in Freedom to Protest?0
Security as an Artificial Science, System Administration, and Tools0
Security Issues in Situational Awareness: Adversarial Threats and Mitigation Techniques0
IEEE Computer Society Diversity and Inclusion0
A Viewpoint: Safer Heaps With Practical Architectural Security Primitives0
On Software Infrastructure: Develop, Prove, Profit?0
Reliability Society0
Table of Contents0
IEEE Jobs Board0
IEEE Computer Society Information0
IEEE Multimedia0
Building Principles for Lawful Cyber Lethal Autonomous Weapons0
IEEE Computer Society Has You Covered!0
Computing Edge0
IEEE Computing Edge0
Masthead0
Front Cover0
IEEE Computer Society Diversity and Inclusion Fund0
Modeling Large-Scale Manipulation in Open Stock Markets0
Table of Contents0
Security Certification: Is It Box Ticking?0
IEEE Computer Graphics and Applications0
IEEE Computer Society Information0
Software Bills of Materials Are Required. Are We There Yet?0
The Seven Golden Principles of Effective Anomaly-Based Intrusion Detection0
Backdoors Against Natural Language Processing: A Review0
Personal IoT Privacy Control at the Edge0
Table of Contents0
Online Log Data Analysis With Efficient Machine Learning: A Review0
Decentralized Public-Key Infrastructure With Blockchain in V2X Communications: Promising or Only Euphoria?0
Memory Corruption at the Border of Trusted Execution0
Problematic Privacy Policies of Voice Assistant Applications0
Journey to the Center of Software Supply Chain Attacks0
IEEE Reliability Society0
Erratum [for "A Taxonomy of Attacks on Federated Learning"]0
IEEE Computer Society Benefits0
Computing in Science & Engineering0
IEEE CS Job Boards0
Masthead0
IEEE CS IT Professional filler0
IEEE Computer Society Information0
Data0
The People Who Live in Glass Houses Are Happy the Stones Weren't Thrown at Them [From the Editors]0
IEEE Reliability Society0
Reliability Society0
Opportunities and Challenges in Securing Critical Infrastructures Through Cryptography0
Table of Contents0
IEEE Computer Society Has You Covered0
The Ransomware Threat to Energy-Delivery Systems0
A Discussion of Public Health, Trust, and Privacy With Susan Landau0
Being the Developers’ Friend: Our Experience Developing a High-Precision Tool for Secure Coding0
Incident Response as a Lawyers’ Service0
IEEE Annals of the History of Computing0
The Our Reality Privacy Policy0
The Future of Digital Investigation: Automated Legal Inference0
Perceptual Hash Inversion Attacks on Image-Based Sexual Abuse Removal Tools0
IEEE Computer Society Call for Papers0
End-to-End Security: When Do We Have It?0
Get Published in the New IEEE Transactions on Privacy0
IEEE Computer Society Call for Papers0
IEEE Reliability Society0
IEEE Transactions on Sustainable Computing0
IEEE TC Generic CFP filler0
Securing Code: A View on the Cultural Aspects of Resilience0
Developing With Formal Methods at BedRock Systems, Inc.0
1.8539462089539