IEEE Security & Privacy

Papers
(The TQCC of IEEE Security & Privacy is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Excerpts From the New Dictionary of Cybersecurity, 203666
Publications Seek 2025 Editors in Chief34
Trust Me, I’m a Liar32
[Front cover]32
IEEE Security & Privacy Subscribe31
IEEE Computer Graphics and Applications28
Front Cover24
Masthead24
Differential Privacy, Firm-Level Data, and the Binomial Pathology23
Cross-Architecture Binary Function Fingerprinting22
IEEE Computer Society Has You Covered!21
IEEE Author's Choice19
The Practices and Challenges of Generating Nonidentifiable Data19
Open Source and Trust19
Masthead17
IEEE Computing in Science and Engineering17
IEEE Computer Society Call for Papers14
Front Cover14
IEEE JobSite14
IEEE Computer Society Benefits13
Inside the Windows Security Push: A Twenty-Year Retrospective13
Cyber Hard Problems: The Next Generation [From the Editors]13
IEEE Intelligent Systems13
IEEE Transactions on Big Data13
IEEE Pervasive Computing Call For Articles13
An Analysis of European Union Cybersecurity Higher Education Programs Through the Crowd-Sourced Database CyberHEAD12
Narrowing the Software Supply Chain Attack Vectors: The SSDF Is Wonderful but not Enough11
IEEE Transactions on Computers11
Table of Contents11
Privacy-Preserving Machine Learning [Cryptography]11
Trusting Trust: Humans in the Software Supply Chain Loop11
Electric Sheep on the Pastures of Disinformation and Targeted Phishing Campaigns: The Security Implications of ChatGPT10
Dissecting the Industrial Control Systems Software Supply Chain10
IEEE Volunteer Service Awards10
IEEE Emerging Technologies10
Global Cybercrime Requires a Collective Response: Are We Prepared to Ban Ransom Payments?9
IEEE Computing edge9
IEEE Transactions on Sustainable Computing9
Citizens’ Cybersecurity Behavior: Some Major Challenges9
IEEE Pervasive Computing: Call for Articles9
IEEE Computer Society Information9
They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web9
What’s Driving Conflicts Around Differential Privacy for the U.S. Census9
Securing Networks with Programmable Data Planes: Opportunities and Challenges9
Security and Privacy Research Artifacts: Are We Making Progress?8
The Dual Role of Machine Learning in Data Anonymization: Top 10 Benefits and Risks8
Sovereignty in the Digital Era: The Quest for Continuous Access to Dependable Technological Capabilities8
The Holy Grail of Vulnerability Predictions8
IEEE Job Boards7
IEEE IT Professional Call for Articles7
IEEE Computer Society Has You Covered!7
IEEE Career Center7
High Assurance in the Twenty-First Century With Roger Schell7
IEEE Career Center7
IEEE Computing Edge7
IEEE Computing Edge7
IEEE Annals filler7
Unusable Security for Attackers [From the Editors]7
Empower New Code Citizens to Reflect and Communicate on Code Security6
Data Acquisition Framework for Micromobility Vehicles Toward Driving Risk Prediction Against Cyberphysical Security Attack6
The Our Reality Privacy Policy6
Masthead6
To Trust or Not To Trust6
IEEE Pervasive Computing Call for Articles6
Reliability Society6
IEEE Emerging Technologies6
In Pursuit of Aviation Cybersecurity: Experiences and Lessons From a Competitive Approach6
IEEE Computing Edge6
IEEE Computer Society Diversity and Inclusion Fund5
Incident Response as a Lawyers’ Service5
Watts S. Humphrey Software Quality Award Nominations5
Nudging Software Developers Toward Secure Code5
A First Look at Zoombombing5
Learning-Based Internet of Things Honeypots for Cyber Deception5
IEEE Computer Society Information5
The Buffet Overflow Café5
IEEE Multimedia5
IEEE Computer Society Information5
IEEE Computer Society Benefits5
Lowering the Bar: How Large Language Models Can be Used as a Copilot by Hardware Hackers4
IEEE Diversity and Inclusion Fund4
IEEE Computer Society Information4
Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures4
Software Development and the Near-Ubiquitous Acceptance of Mystery Meat4
IEEE Computer Society Information4
Table of Contents4
IEEE Computer Society Diversity and Integrity Fund4
Computing Edge4
IEEE Computer Society: Call for Papers4
Why Is Johnny Getting Groomed in Roblox?4
The Double Burden of Moderators: Safeguarding Communities While Facing Identity-Based Harassment4
IEEE Computer Graphics and Applications4
IEEE Computer Society Member Benefits4
Table of Contents4
IEEE Transactions on Privacy4
Get Published in the New IEEE Open Journal of the Computer Society4
Inclusive Internet of Things Privacy Labels4
Adapting a Publicly Focused Individual Health-Care Model to Cybersecurity3
IEEE Computing Edge3
Migrating C to Rust for Memory Safety3
Reconfigurable Digital Twin to Support Research, Education, and Training in the Defense of Critical Infrastructure3
What Has Artifact Evaluation Ever Done for Us?3
IEEE Computer Society Benefits3
Table of Contents3
Equity and Privacy: More Than Just a Tradeoff3
Front Cover3
Impact of Emerging Hardware on Security and Privacy3
Power in Computer Security and Privacy: A Critical Lens3
Obstacles to Practical Supply Chain Risk Management for Digital Components3
Hardware Security in the Era of Emerging Device and System Technologies3
Embedding Privacy Into Design Through Software Developers: Challenges and Solutions3
OpenSSF Scorecard: On the Path Toward Ecosystem-Wide Automated Security Metrics3
Front Cover3
Front Cover3
Synthetic Realities and Artificial Intelligence-Generated Contents3
IEEE Transactions on Computers3
Shockvertising, Malware, and a Lack of Accountability: Exploring Consumer Risks of Virtual Reality Advertisements and Marketing Experiences3
Securing Bystander Privacy in Mixed Reality While Protecting the User Experience3
IEEE Open Journal of the Computer Society3
IEEE Transactions on Sustainable Computing3
Copycat Crimes: Characterizing Code Reuse in the Mobile Android Stalkerware Ecosystem3
Front Cover3
IEEE Career Center3
Toward Fail Safety for Security Decisions2
IEEE Security & Privacy Subscribe filler2
IEEE Computer Society Member Benefits2
IEEE Computer Society Call for Special issue Proposals2
IEEE Career Center2
The State of the Art in Integer Factoring and Breaking Public-Key Cryptography2
An Informative Security and Privacy “Nutrition” Label for Internet of Things Devices2
Usable Security and Privacy for Security and Privacy Workers2
IEEE Jobs Board2
IEEE Career Center2
Computing Edge2
Challenges of Producing Software Bill of Materials for Java2
Reliability Society2
Table of Contents2
A Real-Time Cosimulation Testbed for Electric Vehicle Charging and Smart Grid Security2
We Need a “Building Inspector for IoT” When Smart Homes Are Sold2
Reliability Society2
IEEE Computer Society CFP filler2
Masthead2
Enhancing Security Testing for Identity Management Implementations: Introducing Micro-Id-Gym Language and Micro-Id-Gym Testing Tool2
What Do We Owe?2
Certificate Transparency in Google Chrome: Past, Present, and Future2
Current Perspectives on Securing Critical Infrastructures’ Supply Chains2
A Viewpoint: Harmonizing the Diverse Memory Safety Fronts1
{In Earth} Until (Ready)1
The Amplification of Online Deviancy Through the Language of Violent Crime, War, and Aggression1
IEEE Computer Society Benefits1
Masthead1
Memory Safety1
IEEE Annals of the History of Computing1
Masthead1
Computing on Encrypted Data1
Table of Contents1
IEEE Annals of the History of Computing1
IEEE Open Journal of the Computer Society1
Security and Privacy in the Metaverse1
IEEE Computer Society Has You Covered1
Reliability Society1
The Need of Testbeds for Cyberphysical System Security1
ComputingEdge1
Large Language Models and Security1
Delta Security Certification for Software Supply Chains1
Contextual Integrity, Explained: A More Usable Privacy Definition1
Sphynx: A Deep Neural Network Design for Private Inference1
IEEE Career Center1
IEEE Computer Society Benefits1
Eight Lightweight Usable Security Principles for Developers1
IEEE Reliability Society1
Security Policy as Code1
Computing Edge1
Online Log Data Analysis With Efficient Machine Learning: A Review1
IEEE Computing in Science and Engineering1
IEEE CS CFP filler1
Integrating Cybersecurity and Artificial Intelligence Research in Engineering and Computer Science Education1
IEEE tbd filler1
Front Cover1
On Bridges and Software1
IEEE Computing Edge1
Human Versus Machine: A Comparative Analysis in Detecting Artificial Intelligence-Generated Images1
Side-Channel Attacks: A Short Tour1
Why Is Static Application Security Testing Hard to Learn?1
IEEE Computer Society Information1
Masthead1
Do You Speak Cyber? Talking Security With Developers of Health Systems and Devices1
Whither Software?1
IEEE Jobs Board1
Reliability Society1
Unleashing Malware Analysis and Understanding With Generative AI1
IEEE Annals of the History of Computing1
0.40625905990601