Issue 6 • Nov.-Dec. 2018

Purchase of this issue is not available.

Filter Results

Displaying Results 1 - 22 of 22
  • Front Cover 
  • Front Cover

    Publication Year: 2018, Page(s): C1
    Request permission for reuse | PDF file iconPDF (1665 KB)
    Freely Available from IEEE
  • House Advertisement 
  • IEEE WORLD CONGRESS SERVICES

    Publication Year: 2018, Page(s): C2
    Request permission for reuse | PDF file iconPDF (484 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of Contents

    Publication Year: 2018, Page(s):1 - 2
    Request permission for reuse | PDF file iconPDF (1394 KB)
    Freely Available from IEEE
  • Masthead 
  • Staff List

    Publication Year: 2018, Page(s): 3
    Request permission for reuse | PDF file iconPDF (159 KB)
    Freely Available from IEEE
  • Interview 
  • Silver Bullet Talks With Kathleen Fisher [Interview]

    Publication Year: 2018, Page(s):4 - 9
    Request permission for reuse | PDF file iconPDF (238 KB) | HTML iconHTML
    Freely Available from IEEE
  • Guest Editors' Introduction 
  • Cybersecurity and Privacy Issues in Brazil: Back, Now, and Then [Guest Editors' Introduction]

    Publication Year: 2018, Page(s):10 - 12
    Request permission for reuse | PDF file iconPDF (563 KB) | HTML iconHTML
    Freely Available from IEEE
  • House Advertisement 
  • IEEE Transactions on Big Data

    Publication Year: 2018, Page(s): 13
    Request permission for reuse | PDF file iconPDF (518 KB)
    Freely Available from IEEE
  • Cybersecurity and Privacy Issues in Brazil 
  • Research in Security and Privacy in Brazil

    Publication Year: 2018, Page(s):14 - 21
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1424 KB) | HTML iconHTML

    The main research groups in Brazil working on the topics of security and privacy are characterized by both geographical distribution and research areas. The objective is to highlight the main contributions from these groups to the international community and discuss aspects of the research environment and the challenges ahead. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Good, the Bad, and the Ugly: Two Decades of E-Voting in Brazil

    Publication Year: 2018, Page(s):22 - 30
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (774 KB) | HTML iconHTML

    Brazil pioneered the adoption of nationwide electronic voting 20 years ago. However, today its system is outdated in terms of recent properties. We discuss the system's organization and transparency mechanisms in the context of security requirements derived from a conventional election. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Need for Speed: An Analysis of Brazilian Malware Classifers

    Publication Year: 2018, Page(s):31 - 41
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1627 KB) | HTML iconHTML

    Using a dataset containing about 50,000 samples from Brazilian cyberspace, we show that relying solely on conventional machine-learning systems without taking into account the change of the subject's concept decreases the performance of classification, emphasizing the need to update the decision model immediately after concept drift occurs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NIZKCTF: A Noninteractive Zero-Knowledge Capture-the-Flag Platform

    Publication Year: 2018, Page(s):42 - 51
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1298 KB) | HTML iconHTML

    Capture-the-flag (CTF) competitions are increasingly important for the Brazilian cybersecurity community as educational and professional tools. Unfortunately, CTF platforms may suffer from security issues, giving an unfair advantage to competitors. To mitigate this, we propose NIZKCTF, the first open-audit CTF platform based on noninteractive zero-knowledge proofs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • IEEE IT Professional

    Publication Year: 2018, Page(s): 51
    Request permission for reuse | PDF file iconPDF (722 KB)
    Freely Available from IEEE
  • Cybersecurity and Privacy Issues in Brazil 
  • A Europe-Brazil Context for Secure Data Analytics in the Cloud

    Publication Year: 2018, Page(s):52 - 60
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (697 KB) | HTML iconHTML

    Intercontinental data processing cloud systems raise stringent security and privacy challenges, particularly due to legislation differences. We propose solutions for these challenges with elastic AAA, efficient privacy and anonymization techniques in multiple phases, and security assessment for trustworthiness estimation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AI Ethics 
  • Data Science Data Governance [AI Ethics]

    Publication Year: 2018, Page(s):61 - 70
    Request permission for reuse | PDF file iconPDF (205 KB) | HTML iconHTML
    Freely Available from IEEE
  • Resilient Security 
  • Toward Cyberresiliency in the Context of Cloud Computing [Resilient Security]

    Publication Year: 2018, Page(s):71 - 75
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Cyberresiliency is the capability of an enterprise network to continuously provide (the supported missions and business processes with) essential functions in the midst of an attack campaign. It is defined as "the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that include cyber resources."<sup>1</sup> Conce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • IEEE Letters of Computer Society

    Publication Year: 2018, Page(s): 76
    Request permission for reuse | PDF file iconPDF (946 KB)
    Freely Available from IEEE
  • IEEE Computer Society information

    Publication Year: 2018, Page(s): 77
    Request permission for reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • IEEE Computer Society Join

    Publication Year: 2018, Page(s): 78
    Request permission for reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • IEEE CG&A

    Publication Year: 2018, Page(s): 79
    Request permission for reuse | PDF file iconPDF (974 KB)
    Freely Available from IEEE
  • Last Word 
  • Unnoticed Consent [Last Word]

    Publication Year: 2018, Page(s):80 - 79
    Request permission for reuse | PDF file iconPDF (1140 KB) | HTML iconHTML
    Freely Available from IEEE
  • House Advertisement 
  • IEEE Jobs Board

    Publication Year: 2018, Page(s): C3
    Request permission for reuse | PDF file iconPDF (3329 KB)
    Freely Available from IEEE
  • IEEE COMPSAC 2019

    Publication Year: 2018, Page(s): C4
    Request permission for reuse | PDF file iconPDF (353 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Security & Privacy’s primary objective is to stimulate and track advances in security, privacy, and dependability and present these advances in a form that can be useful to a broad cross-section of the professional community—ranging from academic researchers to industry practitioners. It provides articles with both a practical and research bent by the top thinkers in the field of security and privacy, along with case studies, surveys, tutorials, columns, and in-depth interviews and podcasts for the information security industry.

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
David M. Nicol
University of Illinois at Urbana Champaign
dmnicol@illinois.edu