Pub Date : 2024-08-02DOI: 10.1109/msec.2024.3401288
Francis Kofi Andoh-Baidoo, Martin Otu Offei, Emmanuel W. Ayaburi, Mikko Siponen, Pavel Gladyshev
{"title":"How Do Real Cybercrime Syndicates Operate?: The Case of Online Romance Fraud Syndicates","authors":"Francis Kofi Andoh-Baidoo, Martin Otu Offei, Emmanuel W. Ayaburi, Mikko Siponen, Pavel Gladyshev","doi":"10.1109/msec.2024.3401288","DOIUrl":"https://doi.org/10.1109/msec.2024.3401288","url":null,"abstract":"","PeriodicalId":13152,"journal":{"name":"IEEE Security & Privacy","volume":"56 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141881703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-02DOI: 10.1109/msec.2024.3425112
{"title":"Get Published in the New IEEE Transactions on Privacy","authors":"","doi":"10.1109/msec.2024.3425112","DOIUrl":"https://doi.org/10.1109/msec.2024.3425112","url":null,"abstract":"","PeriodicalId":13152,"journal":{"name":"IEEE Security & Privacy","volume":"8 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141886915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-12DOI: 10.1109/msec.2024.3417804
Jinkyung Katie Park, Mamtaj Akter, Pamela Wisniewski, Karla Badillo-Urquiola
{"title":"It’s Still Complicated: From Privacy-Invasive Parental Control to Teen-Centric Solutions for Digital Resilience","authors":"Jinkyung Katie Park, Mamtaj Akter, Pamela Wisniewski, Karla Badillo-Urquiola","doi":"10.1109/msec.2024.3417804","DOIUrl":"https://doi.org/10.1109/msec.2024.3417804","url":null,"abstract":"","PeriodicalId":13152,"journal":{"name":"IEEE Security & Privacy","volume":"40 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141610389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-10DOI: 10.1109/msec.2024.3417819
Kopo M. Ramokapane, Maria Sameen, Zaina Dkaidek
{"title":"Inclusive Internet of Things Privacy Labels","authors":"Kopo M. Ramokapane, Maria Sameen, Zaina Dkaidek","doi":"10.1109/msec.2024.3417819","DOIUrl":"https://doi.org/10.1109/msec.2024.3417819","url":null,"abstract":"","PeriodicalId":13152,"journal":{"name":"IEEE Security & Privacy","volume":"52 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141588582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-24DOI: 10.1109/msec.2024.3410112
Zander W. Blasingame, Chen Liu
{"title":"Fast-DiM: Towards Fast Diffusion Morphs","authors":"Zander W. Blasingame, Chen Liu","doi":"10.1109/msec.2024.3410112","DOIUrl":"https://doi.org/10.1109/msec.2024.3410112","url":null,"abstract":"","PeriodicalId":13152,"journal":{"name":"IEEE Security & Privacy","volume":"1 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141529639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-21DOI: 10.1109/msec.2024.3396701
Robert N. M. Watson, David Chisnall, Jessica Clarke, Brooks Davis, Nathaniel Wesley Filardo, Ben Laurie, Simon W. Moore, Peter G. Neumann, Alexander Richardson, Peter Sewell, Konrad Witaszczyk, Jonathan Woodruff
{"title":"CHERI: Hardware-Enabled C/C++ Memory Protection at Scale","authors":"Robert N. M. Watson, David Chisnall, Jessica Clarke, Brooks Davis, Nathaniel Wesley Filardo, Ben Laurie, Simon W. Moore, Peter G. Neumann, Alexander Richardson, Peter Sewell, Konrad Witaszczyk, Jonathan Woodruff","doi":"10.1109/msec.2024.3396701","DOIUrl":"https://doi.org/10.1109/msec.2024.3396701","url":null,"abstract":"","PeriodicalId":13152,"journal":{"name":"IEEE Security & Privacy","volume":"72 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141508394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}