SecurityPrivacyMag
@securityprivacy
Followers
2K
Following
116
Media
72
Statuses
975
IEEE Security & Privacy magazine provides research articles, case studies, tutorials, and columns for the information security industry.
Los Alamitos, CA
Joined April 2009
Daniel E. Geer, Jr. closes out this issue of S&P Magazine with a piece on the ongoing convergence of biology and artificial intelligence: @ComputerSociety
#IEEECS
2
0
2
Read about the state of cybersecurity education within the EU in this issue of S&P Magazine: @ComputerSociety
#IEEECS
0
1
2
Want to pursue higher education in cybersecurity in Europe? Read this analysis of cybersecurity degree programs across 26 European countries: @ComputerSociety
#IEEECS
0
0
1
“Transient execution attacks are a reminder that the abstractions we use to program computers can differ from what the hardware provides.” Read more on these attacks in this issue of S&P: @ComputerSociety
#IEEECS
0
1
1
“Pitfalls come in various forms and flavors, some obvious but others noticeable only with a very cautious eye.” Read more on prevalent pitfalls in AI-driven solutions for computer security: @ComputerSociety
#IEEECS
0
0
1
Learn about the benefits and limitations of using machine learning in static application security testing: @ComputerSociety
#IEEECS
0
3
2
What are “transient execution attacks”? Frank Piessens uses processor models to attack the question: @ComputerSociety
#IEEECS
0
0
2
In this issue of S&P Magazine, read about 10 common pitfalls that can affect the experimental outcomes of AI driven solutions in computer security: @ComputerSociety
#IEEECS
0
0
1
Static application security testing (SAST) involves statically examining source code to find security flaws that make applications susceptible to attack. Read about an approach to such analyses using machine learning: @ComputerSociety
#IEEECS
0
1
2
Learn about potential security challenges 5G and beyond-5G wireless systems, and new research areas to alleviate such challenges: @ComputerSociety
#IEEECS
0
0
1
“While most IT components are well prepared for automation, OT hard/software is not.” Read on operational technology and IT critical infrastructures: @ComputerSociety
#IEEECS
0
0
1
The US Census Bureau’s use of differential privacy is a hotly contested topic. @priyakalot and @JessicaHullman provide an overview of confidentiality conflicts and offer suggestions for researchers and organizations adopting differential privacy: @ComputerSociety
#IEEECS
1
3
6
Researchers from @Princeton, @LifeAtPurdue and @ucsantabarbara identify emerging security challenges for 5G and beyond-5G wireless systems, in this issue of S&P Magazine: @ComputerSociety
#IEEECS
0
0
1
Researchers from @hslu and @diemobiliar evaluate automated backup, recovery, and configuration management for real-world use and identify limits for operational technology systems: @ComputerSociety
#IEEECS
0
1
1
How private should U.S. census data be? @priyakalot and @JessicaHullman discuss the current debate around census data confidentiality and offer suggestions for adopting formal privacy, in this issue of S&P: @ComputerSociety
#IEEECS
0
0
3
Abdul Majeed and Seong Oun Hwang highlight the shortcomings of syntactic and semantic mechanisms for preserving individuals’ data privacy, and propose new guidelines to improve such technology: @ComputerSociety
#IEEECS
0
0
1
When it comes to protecting the privacy of smart device users, children are a particularly vulnerable group. Read about how 6 smart speaker manufacturers across the US and China protect child users, and how they could do better: @ComputerSociety
#IEEECS
0
0
1
In the age of big data, it is essential to keep personal data secure from entities like malevolent adversaries, social networking sites, and privacy-transgressing employees. Read some proposed guidelines from researchers at Gachon University: @ComputerSociety
#IEEECS
0
1
1
Curious how child privacy protection policies differ across smart devices, and across countries? Read a new analysis of smart speaker privacy protections in China and the US: @ComputerSociety
#IEEECS
0
0
1
In this edition’s “Off by One” column, read a short story by @yoshi_kohno about a world where our reality mixes with virtual reality to produce dangerous consequences @ComputerSociety
#IEEECS
0
0
1