IEEE Security & Privacy

Papers
(The TQCC of IEEE Security & Privacy is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-07-01 to 2025-07-01.)
ArticleCitations
Trust Me, I’m a Liar58
Excerpts From the New Dictionary of Cybersecurity, 203642
Publications Seek 2025 Editors in Chief32
IEEE Computer Graphics and Applications28
Masthead28
IEEE Security & Privacy Subscribe27
[Front cover]25
Front Cover24
Cross-Architecture Binary Function Fingerprinting23
IEEE Computer Society Has You Covered!21
Differential Privacy, Firm-Level Data, and the Binomial Pathology20
IEEE Author's Choice18
The Practices and Challenges of Generating Nonidentifiable Data17
Masthead16
IEEE Computer Society Call for Papers16
Front Cover16
Open Source and Trust16
IEEE JobSite15
IEEE Computing in Science and Engineering15
IEEE Pervasive Computing Call For Articles14
IEEE Transactions on Big Data14
IEEE Transactions on Computers13
Is Vulnerability Report Confidence Redundant? Pitfalls Using Temporal Risk Scores12
Security and Privacy for Edge Artificial Intelligence12
Inside the Windows Security Push: A Twenty-Year Retrospective11
An Analysis of European Union Cybersecurity Higher Education Programs Through the Crowd-Sourced Database CyberHEAD11
Dissecting the Industrial Control Systems Software Supply Chain11
Trusting Trust: Humans in the Software Supply Chain Loop11
Narrowing the Software Supply Chain Attack Vectors: The SSDF Is Wonderful but not Enough11
IEEE Intelligent Systems10
IEEE Computer Society Benefits10
Table of Contents10
Privacy-Preserving Machine Learning [Cryptography]10
Cyber Hard Problems: The Next Generation [From the Editors]10
IEEE Computing edge9
Electric Sheep on the Pastures of Disinformation and Targeted Phishing Campaigns: The Security Implications of ChatGPT9
They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web8
IEEE Computer Society Information8
IEEE Transactions on Sustainable Computing8
Security and Privacy Research Artifacts: Are We Making Progress?8
Global Cybercrime Requires a Collective Response: Are We Prepared to Ban Ransom Payments?8
The Dual Role of Machine Learning in Data Anonymization: Top 10 Benefits and Risks8
What’s Driving Conflicts Around Differential Privacy for the U.S. Census8
Citizens’ Cybersecurity Behavior: Some Major Challenges8
IEEE Pervasive Computing: Call for Articles8
Cybersecurity Advocates: Force Multipliers in Security Behavior Change8
The Our Reality Privacy Policy7
Sovereignty in the Digital Era: The Quest for Continuous Access to Dependable Technological Capabilities7
IEEE IT Professional Call for Articles7
The Holy Grail of Vulnerability Predictions7
IEEE Computing Edge7
IEEE Annals filler6
IEEE Computer Society Has You Covered!6
Table of Contents6
IEEE Career Center6
High Assurance in the Twenty-First Century With Roger Schell6
IEEE Job Boards6
Unusable Security for Attackers [From the Editors]6
IEEE Computing Edge5
IEEE Computing Edge5
A First Look at Zoombombing5
IEEE Multimedia5
Data Acquisition Framework for Micromobility Vehicles Toward Driving Risk Prediction Against Cyberphysical Security Attack5
Masthead5
IEEE Computer Society Diversity and Inclusion Fund5
IEEE Pervasive Computing Call for Articles5
Reliability Society5
In Pursuit of Aviation Cybersecurity: Experiences and Lessons From a Competitive Approach5
Empower New Code Citizens to Reflect and Communicate on Code Security5
Computing Edge4
Impact of Emerging Hardware on Security and Privacy4
IEEE Computer Society Information4
Watts S. Humphrey Software Quality Award Nominations4
IEEE Computer Society Information4
IEEE Transactions on Computers4
The Double Burden of Moderators: Safeguarding Communities While Facing Identity-Based Harassment4
Synthetic Realities and Artificial Intelligence-Generated Contents4
Adapting a Publicly Focused Individual Health-Care Model to Cybersecurity4
The Buffet Overflow Café4
Incident Response as a Lawyers’ Service4
IEEE Computer Society: Call for Papers4
[Masthead]4
Nudging Software Developers Toward Secure Code4
Front Cover4
What Has Artifact Evaluation Ever Done for Us?4
Why Is Johnny Getting Groomed in Roblox?4
Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures4
IEEE Computer Society Benefits4
Get Published in the New IEEE Open Journal of the Computer Society4
Inclusive Internet of Things Privacy Labels4
Software Development and the Near-Ubiquitous Acceptance of Mystery Meat4
IEEE Career Center3
Table of Contents3
IEEE Computing in Science & Engineering3
IEEE Computer Graphics and Applications3
Embedding Privacy Into Design Through Software Developers: Challenges and Solutions3
IEEE Computer Society Call for Special issue Proposals3
Migrating C to Rust for Memory Safety3
Shockvertising, Malware, and a Lack of Accountability: Exploring Consumer Risks of Virtual Reality Advertisements and Marketing Experiences3
IEEE Transactions on Sustainable Computing3
IEEE Computing Edge3
Front Cover3
IEEE Diversity and Inclusion Fund3
IEEE Computer Society Member Benefits3
Table of Contents3
IEEE Computer Society Benefits3
Reliability Society3
Power in Computer Security and Privacy: A Critical Lens3
Hardware Security in the Era of Emerging Device and System Technologies3
Securing Bystander Privacy in Mixed Reality While Protecting the User Experience3
Table of Contents3
Equity and Privacy: More Than Just a Tradeoff3
IEEE Computer Society Information3
IEEE Computer Society Diversity and Integrity Fund3
Front Cover3
Front Cover3
Reconfigurable Digital Twin to Support Research, Education, and Training in the Defense of Critical Infrastructure3
IEEE Career Center3
OpenSSF Scorecard: On the Path Toward Ecosystem-Wide Automated Security Metrics3
Toward Fail Safety for Security Decisions2
Usable Security and Privacy for Security and Privacy Workers2
IEEE Computer Society CFP filler2
IEEE Security & Privacy Subscribe filler2
The State of the Art in Integer Factoring and Breaking Public-Key Cryptography2
An Informative Security and Privacy “Nutrition” Label for Internet of Things Devices2
Delta Security Certification for Software Supply Chains2
On Bridges and Software2
Table of Contents2
We Need a “Building Inspector for IoT” When Smart Homes Are Sold2
Current Perspectives on Securing Critical Infrastructures’ Supply Chains2
Computing Edge2
Certificate Transparency in Google Chrome: Past, Present, and Future2
IEEE Computer Society Member Benefits2
Memory Safety2
Front Cover2
IEEE Career Center2
What Do We Owe?2
Enhancing Security Testing for Identity Management Implementations: Introducing Micro-Id-Gym Language and Micro-Id-Gym Testing Tool2
Masthead2
IEEE Annals of the History of Computing2
IEEE Jobs Board2
A Real-Time Cosimulation Testbed for Electric Vehicle Charging and Smart Grid Security2
The Amplification of Online Deviancy Through the Language of Violent Crime, War, and Aggression2
IEEE Computing Edge2
Reliability Society2
Challenges of Producing Software Bill of Materials for Java2
A Viewpoint: Harmonizing the Diverse Memory Safety Fronts1
IEEE tbd filler1
Large Language Models and Security1
IEEE Annals of the History of Computing1
Masthead1
IEEE Open Journal of the Computer Society1
Secure Access Service Edge Convergence: Recent Progress and Open Issues1
A Maturity Spectrum for Data Institutions1
IEEE Computer Society1
Integrating Cybersecurity and Artificial Intelligence Research in Engineering and Computer Science Education1
Computing on Encrypted Data1
Unleashing Malware Analysis and Understanding With Generative AI1
IEEE Reliability Society1
{In Earth} Until (Ready)1
IEEE Computing in Science and Engineering1
Opportunities and Challenges in Securing Critical Infrastructures Through Cryptography1
Computing Edge1
IEEE Annals of the History of Computing1
IEEE Computer Society Information1
Table of Contents1
IEEE Career Center1
ComputingEdge1
IEEE Computer Society Has You Covered1
Seven Pain Points of Threat Analysis and Risk Assessment in the Automotive Domain1
On Data Licenses for Open Source Threat Intelligence1
Eight Lightweight Usable Security Principles for Developers1
Masthead1
Security Policy as Code1
The Need of Testbeds for Cyberphysical System Security1
Table of Contents1
Online Log Data Analysis With Efficient Machine Learning: A Review1
IEEE Annals of the History of Computing1
End-to-End Security: When Do We Have It?1
Whither Software?1
Masthead1
Security and Privacy in the Metaverse1
Human Versus Machine: A Comparative Analysis in Detecting Artificial Intelligence-Generated Images1
IEEE Computer Society Member Benefits1
Contextual Integrity, Explained: A More Usable Privacy Definition1
Reliability Society1
Sphynx: A Deep Neural Network Design for Private Inference1
Toward Common Weakness Enumerations in Industrial Control Systems1
Masthead1
Why Is Static Application Security Testing Hard to Learn?1
Side-Channel Attacks: A Short Tour1
IEEE Transactions on Sustainable Computing1
Do You Speak Cyber? Talking Security With Developers of Health Systems and Devices1
IEEE Jobs Board1
Security Certification: Is It Box Ticking?1
Masthead1
IEEE CS CFP filler1
0.048659086227417