首页 文献索引 SCI期刊 AI助手
期刊目录筛选

期刊名:Ieee security & privacy

缩写:IEEE SECUR PRIV

ISSN:1540-7993

e-ISSN:1558-4046

IF/分区:3.0/Q2

文章目录 更多期刊信息

共收录本刊相关文章索引9
Clinical Trial Case Reports Meta-Analysis RCT Review Systematic Review
Classical Article Case Reports Clinical Study Clinical Trial Clinical Trial Protocol Comment Comparative Study Editorial Guideline Letter Meta-Analysis Multicenter Study Observational Study Randomized Controlled Trial Review Systematic Review
Mary Theofanos,Simson Garfinkel,Yee-Yin Choong Mary Theofanos
Surveys of US Defense and Commerce department employees show that using Personal Identity Verification and Common Access Cards for two-factor authentication results in improved usability and security.
Julie Haney,Wayne Lutters,Jody Jacobs Julie Haney
Cybersecurity advocates motivate individuals and organizations to adopt positive security behaviors. Based on our research, we describe qualities of successful advocates. Our findings have practical implications for expanding the cybersecur...
Assane Gueye,Carlos E C Galhardo,Irena Bojanova et al. Assane Gueye et al.
The Common Weakness Enumeration (CWE) community publishes an aggregate metric to calculate the 'Most Dangerous Software Errors.' However, the used equation highly biases frequency over exploitability and impact. We provide a metric to mitig...
Chad Brubaker,Suman Jana,Baishakhi Ray et al. Chad Brubaker et al.
Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded devices, and all of secure Web rely on SSL/TLS for protection again...
Denise Anthony,Andrew T Campbell,Thomas Candon et al. Denise Anthony et al.
Dartmouth College's Institute for Security, Technology, and Society conducted three workshops on securing information technology in healthcare, attended by a diverse range of experts in the field. This article summarizes the three workshops...
Krishna K Venkatasubramanian,Eugene Y Vasserman,Oleg Sokolsky et al. Krishna K Venkatasubramanian et al.
Carl A Gunter,David Liebovitz,Bradley Malin Carl A Gunter
Experience-based access management incorporates models, techniques, and tools to reconcile differences between the ideal access model and the enforced access control.