
History of Security & Privacy in 134 Chapters
About
- This is a curated and experimental site, offering historical and visual index of all collected sources.
- The site does not host any of the files. It only provides an index and links to full text files.
- Full text of many sources is behind a paywall. You may need to obtain a subscription to read full text.
Latest Issue
2025
| ![]() | Latest Issue:
|
History
· | ||
2024
| ![]() | A Year Ago:
|
· · · · | ||
2020
| ![]() | 5 Years Ago:
|
· · · · · | ||
2015
| ![]() | 10 Years Ago:
|
· · · · · | ||
2010
| ![]() | 15 Years Ago:
|
· · · · · | ||
2005
| ![]() | 20 Years Ago:
|
· · · | ||
2003
| ![]() | Premiere Issue:
|
History of Ideas
This report analyzes the evolution of cybersecurity and privacy concerns as reflected in article titles from various publications between 2003 and 2025. By grouping titles chronologically, we can observe shifts in focus, emerging threats, and the industry's evolving response strategies.
The Early Years: Establishing the Foundations (2003-2006)
The early 2000s marked a foundational period for cybersecurity, characterized by a reactive stance against prevalent threats and a nascent understanding of privacy in the digital age. Key themes revolved around immediate defensive measures, the inherent insecurity of software, and the struggle to quantify and manage risk.
Key Themes & Trends:
- Battling Malware: The landscape was dominated by widespread worms and viruses, with titles like "The Slammer Worm," "The Zotob Storm," and "Worm Propagation and Generic Attacks" highlighting constant vigilance and efforts at containment. Honeypots emerged as a vital tool for understanding attacker behavior, as seen in "The Honeynet Project: Trapping the Hackers."
- Software Insecurity & Development: A significant focus was on the root causes of vulnerabilities in software. "Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors" and "Why Secure Applications are Difficult to Write" underscored the systemic issues. The concept of "building security in" during development, rather than patching later, began to gain traction ("Building Secure Web-Based Environments," "Adopting a Software Security Improvement Program").
- Emerging Privacy Concerns: While security often took precedence, early discussions on privacy were also present. RFID technology raised questions about data collection ("Are RFIDs Coming to Get You?", "RFID Privacy: An Overview of Problems and Proposed Solutions"). The tension between usability and security was also noted ("In Search of Usable Security").
- Defining and Measuring Security: There was an ongoing effort to define what security truly meant and how to measure it effectively. "What Is Computer Security?" and "Common Vulnerability Scoring System" reflect this foundational work.
Shifts & Continuities: This period was largely reactive, focusing on "firefighting" common threats. However, we see the very first inklings of a shift towards proactive measures, such as integrating security into the software development lifecycle. The persistent challenge of making security usable also clearly emerges.
Expanding Horizons: Cloud, Mobile, and Nation-State Threats (2007-2010)
As technology proliferated, cybersecurity concerns expanded dramatically beyond traditional networks and desktops. This era saw the rise of new attack surfaces and the chilling realization of nation-state involvement in cyber conflict.
Key Themes & Trends:
- Cloud Computing Security: The rapid adoption of cloud services brought a host of new security challenges. Titles like "Security and Privacy Challenges in Cloud Computing Environments," "Don't Trust. And Verify: A Security Architecture Stack for the Cloud," and "Hide and Seek in the Cloud" showcased the scramble to secure this new paradigm.
- Mobile Device Security: With smartphones gaining popularity, mobile security became a critical area. "Understanding Android Security," "Google Android: A Comprehensive Security Assessment," and "Mobile Device Security [Guest Editors' Introduction]" illustrate the new threats posed by these ubiquitous devices.
- Cyberwarfare Enters the Discourse: The specter of cyberwarfare became a stark reality, particularly with the Stuxnet incident. "Stuxnet: Dissecting a Cyberwarfare Weapon," "Cyberwarfare," and "Deterring Strategic Cyberattack" reflect a growing awareness of state-sponsored threats.
- Critical Infrastructure Protection: Securing industrial control systems (ICS) and smart grids gained urgency. "Automated Control System Security" and "Smart-Grid Security Issues" indicate a recognition of vulnerabilities beyond traditional IT.
- Identity Management Evolution: The complexity of digital identities led to a push for more robust management systems, including biometrics and federated approaches ("Identity Management's Misaligned Incentives," "A Mobile Biometric System-on-Token System for Signing Digital Transactions").
Shifts & Continuities: This period marks a significant expansion from enterprise-focused security to a broader recognition of systemic, national, and even international threats. The move from theoretical discussions of cyberwarfare to analysis of real-world attacks like Stuxnet was a major continuity from the foundational period's reactive stance, but applied to a much larger, more complex landscape. The early emphasis on "building security in" for software started to translate to other domains like mobile and cloud.
Maturing Threats and Policy Responses (2011-2014)
The middle of the decade saw cybersecurity mature as a discipline, grappling with sophisticated attacks, widespread data privacy concerns, and a growing recognition of the human element in security. Policy and governance started to catch up with technological realities.
Key Themes & Trends:
- Supply Chain & Critical Infrastructure Focus: The vulnerability of interconnected systems became a major theme, particularly concerning critical infrastructure. "The Ransomware Threat to Energy-Delivery Systems" and "Securing Critical Infrastructure Across Cyber and Physical Dimensions" show this continued focus. The "supply chain" concept began to gain prominence.
- Post-Snowden Privacy Landscape: Edward Snowden's revelations fundamentally reshaped the privacy debate. Titles like "Making Sense from Snowden" and "Metadata = Surveillance" reflect heightened public and academic scrutiny of government surveillance and data collection practices.
- Formal Methods & Assurance: There was an increasing call for rigorous, verifiable security. "Formal Methods at Scale" and "Building Reliable and Secure Virtual Machines Using Architectural Invariants" highlight efforts to bring mathematical certainty to system design.
- Moving Target Defense: The concept of dynamically changing system configurations to thwart attackers emerged as a promising strategy ("Moving-Target Defenses for Computer Networks," "Security through Diversity").
- Genomic Privacy: A new frontier of privacy concerns arose with the increasing availability of genetic data ("Genomic Privacy and the Rise of a New Research Community").
Shifts & Continuities: This era saw a clear shift from primarily technical solutions to a more holistic approach incorporating policy, human factors, and legal frameworks, particularly in response to the massive privacy implications of surveillance. The continued focus on critical infrastructure and software supply chain foreshadows future challenges. The industry started talking more about resilience in addition to prevention.
The AI & Blockchain Emergence (2015-2018)
This period saw the disruptive potential of Artificial Intelligence and Blockchain technology begin to permeate cybersecurity discussions, presenting both new opportunities for defense and novel avenues for attack.
Key Themes & Trends:
- AI/ML in Cybersecurity: AI and machine learning started to be viewed as powerful tools for both offense and defense. "Artificial Intelligence and the Attack/Defense Balance," "AI and the Ethics of Automating Consent," and "Safe Machine Learning and Defeating Adversarial Attacks" reflect this dual nature.
- Blockchain & Cryptocurrencies: Blockchain garnered significant attention for its potential in identity management, secure transactions, and even cybersecurity itself. "Blockchain Security and Privacy," "A First Look at Identity Management Schemes on the Blockchain," and "When the Crypto in Cryptocurrencies Breaks" exemplify this burgeoning area.
- Post-Quantum Cryptography: The impending threat of quantum computers to current cryptographic standards became a serious topic, leading to research into future-proof solutions ("Postquantum Cryptography, Part 2," "Cryptography after the Aliens Land").
- Continued IoT Vulnerabilities: The rapid proliferation of IoT devices continued to pose significant security risks, with titles like "IoT Goes Nuclear" emphasizing the potential for widespread impact.
- Human Factors & Ethics: The role of human behavior and ethical considerations in AI and data privacy became more pronounced ("How the Human Brain Buys Security," "Ethics and Privacy in AI and Big Data").
Shifts & Continuities: The introduction of AI and blockchain marks a significant new frontier, moving beyond traditional software and network security to consider fundamentally new technological paradigms. The privacy debate continued to deepen, now incorporating algorithmic fairness and the ethics of automated decisions. The discussions around quantum computing illustrate a proactive look toward future threats, a continuity from earlier policy and formal methods discussions.
Supply Chain, Deepfakes, and Human-Centric Security (2019-2022)
This era was heavily influenced by high-profile supply chain attacks, the growing sophistication of AI-generated content, and a concerted effort to make security more inclusive and user-friendly.
Key Themes & Trends:
- Software Supply Chain Security: Following incidents like SolarWinds, software supply chain security became a paramount concern. "Narrowing the Software Supply Chain Attack Vectors" and "Top Five Challenges in Software Supply Chain Security" indicate a focused industry response, with SBOMs (Software Bill of Materials) gaining traction.
- Deepfakes & Synthetic Media: The malicious potential of AI-generated content, particularly deepfakes, became a major discussion point, with articles like "Understanding the Impact of AI-Generated Deepfakes on Public Opinion" and "Dispelling Misconceptions and Characterizing the Failings of Deepfake Detection."
- Inclusive Security & Privacy: There was a strong emphasis on designing security and privacy solutions that consider diverse user needs and experiences, including "Inclusive Privacy and Security," "Inclusive Involvement of At-Risk Users," and "Understanding Phishing Experiences of Screen Reader Users."
- Metaverse/XR Security & Privacy: As extended reality (XR) and metaverse concepts gained steam, their unique security and privacy implications were explored ("Security and Privacy in the Metaverse," "Augmenting Security and Privacy in the Virtual Realm").
- AI in Malware Analysis & Threat Intelligence: AI's role in understanding and combating malware continued to evolve, as seen in "Unleashing Malware Analysis and Understanding With Generative AI" and "Phishing Detection Leveraging Machine Learning and Deep Learning."
Shifts & Continuities: The supply chain shift was a major continuity, evolving from a recognized problem to a crisis requiring systemic solutions like SBOMs. The rise of deepfakes highlighted a new dimension of information security: trust in digital media. The focus on "inclusive" and "human-centric" security marked a critical maturation of the field, acknowledging that technology design must account for diverse user realities and behaviors.
Proactive Defense and AI-Driven Future (2023-2025)
The most recent period reflects a concerted move towards proactive, design-centric security, deeply integrating AI across various functions, and addressing fundamental software weaknesses.
Key Themes & Trends:
- Software Bill of Materials (SBOMs) & Provenance: SBOMs solidified as a critical proactive defense mechanism, aiming for transparency in the software supply chain. Titles like "Software Bill of Materials as a Proactive Defense" and "Establishing Provenance Before Coding" indicate widespread adoption and emphasis on traceability.
- AI in Code Generation & Cyberdefense: Large Language Models (LLMs) are central, explored for both their utility and risks in code generation and repair ("Challenges to Using Large Language Models in Code Generation and Repair"). The vision of "The Path to Autonomous Cyberdefense" points to an AI-driven future for security operations.
- Memory Safety Revival: Memory safety resurfaces as a fundamental and urgent problem, with strong calls for solutions. "Memory Safety Manifesto," "Migrating C to Rust for Memory Safety," and "Full Spatial and Temporal Memory Safety for C" show a significant push towards addressing this long-standing vulnerability.
- Secure by Design & Policy as Code: The philosophy of building security in from the ground up is paramount ("Secure by Design for Everyone," "Security Requirements and Secure Software Design"). "Security Policy as Code" reflects automation and consistency in governance.
- Digital Twin & Emerging Tech Security: The security of "Digital Twin Security" for physical systems and "Handling Identity and Fraud in the Metaverse" underscore the continued expansion of security into new, interconnected digital-physical realms.
- Cultural Aspects of Security: The human element remains important, with titles like "Securing Code: A View on the Cultural Aspects of Resilience" and "Empower New Code Citizens to Reflect and Communicate on Code Security" emphasizing the social and cultural dimensions of secure practices.
Shifts & Continuities: This period represents a significant leap towards proactive and automated security, moving beyond reactive patching. The intense focus on memory safety is a return to a fundamental problem, but with modern solutions and a strong sense of urgency. AI is no longer just a concept but is actively being integrated into core security functions, from code development to defense. The underlying continuity is the constant struggle to secure ever-more complex and interconnected systems, now with sophisticated AI tools at both the attacker's and defender's disposal.
Conclusion
Across these periods, a compelling narrative emerges: cybersecurity has evolved from a reactive struggle against discrete threats to a complex, multidisciplinary field deeply intertwined with policy, human behavior, and emerging technologies. Early efforts focused on patching vulnerabilities and basic privacy. Over time, the scope expanded to critical infrastructure, cloud, and mobile. More recently, the advent of AI has reshaped both attack and defense landscapes, while a renewed focus on foundational software security (like memory safety) and a proactive, "secure by design" philosophy indicates a maturation of the industry. The constant tension between security and usability, the increasing complexity of systems, and the geopolitical implications of cyber conflict remain enduring challenges that continue to drive innovation and policy development.
A searchable index (by theme and year) of all 134 IEEE Security & Privacy cover pages (from 2003 to present).

2025


2024






2023






2022






2021






2020






2019






2018






2017






2016






2015






2014






2013






2012






2011






2010






2009






2008






2007






2006






2005






2004






2003






Silver Bullet TalksThe Silver Bullet Security Podcast with Dr. Gary McGraw is published once a month. The series started in April 2006. The podcast features in-depth conversations with security gurus. Guests include technologists, academics, business people, authors, the press, and government officials. |
A searchable index (title, author, year) of all 2170 IEEE Security & Privacy articles (excluding table of contents, front covers, commercials).
Common themes: security; cybersecurity; cryptography; privacy; data; internet; software; hardware; web; mobile; cloud; authentication; biometrics; policy; education; economics; legal; social; usability; frameworks; silver bullet talks;

A searchable index of 3071 IEEE Security & Privacy authors. 592 authors published multiple articles.

Gary McGraw | 91 articles |
Daniel Geer Jr. | 62 articles |
Bruce Schneier | 44 articles |
Steven Bellovin | 40 articles |
Michael Lesk | 40 articles |
Shari Lawrence Pfleeger | 32 articles |
Marc Donner | 28 articles |
Matt Bishop | 23 articles |
Fabio Massacci | 21 articles |
Lee Garber | 21 articles |
Fred Schneider | 20 articles |
Terry Benzel | 19 articles |
Sean Peisert | 18 articles |
Carl Landwehr | 18 articles |
Sean Smith | 18 articles |
Tadayoshi Kohno | 17 articles |
Paul van Oorschot | 16 articles |
Deborah Frincke | 16 articles |
Brandi Ortega | 16 articles |
Jeremy Epstein | 15 articles |
Susan Landau | 15 articles |
Daniel Conway | 14 articles |
Iván Arce | 14 articles |
Michael Caloyannides | 14 articles |
Martin Stytz | 14 articles |
Patrick McDaniel | 13 articles |
Ahmad-Reza Sadeghi | 13 articles |
Simson Garfinkel | 12 articles |
Trent Jaeger | 12 articles |
Laurie Williams | 12 articles |
Lorrie Faith Cranor | 12 articles |
Cynthia Irvine | 12 articles |
Roland Trope | 12 articles |
Elisa Bertino | 11 articles |
David Naccache | 11 articles |
Richard Ford | 11 articles |
George Cybenko | 11 articles |
Gunnar Peterson | 11 articles |
Hamed Okhravi | 10 articles |
Ross Anderson | 9 articles |
Salvatore Stolfo | 9 articles |
Elias Levy | 9 articles |
Brent Kesler | 9 articles |
Greg Goth | 9 articles |
Awais Rashid | 8 articles |
David Nicol | 8 articles |
Cormac Herley | 8 articles |
Sergey Bratus | 8 articles |
John Viega | 8 articles |
John Steven | 8 articles |
Scott Andresen | 8 articles |
Daniel Geer | 7 articles |
Michael Howard | 7 articles |
Bob Blakley | 7 articles |
Jelena Mirkovic | 7 articles |
Khaled El Emam | 7 articles |
Srdjan Capkun | 7 articles |
Nancy Mead | 7 articles |
L. Jean Camp | 7 articles |
Jonathan Margulies | 7 articles |
M. Eric Johnson | 7 articles |
Kjell Jørgen Hole | 7 articles |
Charles Palmer | 7 articles |
James Figueroa | 7 articles |
Mary Ellen Zurko | 6 articles |
William Enck | 6 articles |
Luca Caviglione | 6 articles |
Ari Juels | 6 articles |
Markus Jakobsson | 6 articles |
Melissa Dark | 6 articles |
Michael Locasto | 6 articles |
Robin Bloomfield | 6 articles |
Brian Chess | 6 articles |
Lori Kaufman | 6 articles |
Bruce Potter | 6 articles |
Annie Antón | 6 articles |
E. Michael Power | 6 articles |
Heather Drinan | 6 articles |
James Whittaker | 6 articles |
Benjamin Alfonsi | 6 articles |
Jim Hearn | 6 articles |
Jonathan Spring | 5 articles |
Antonino Sabetta | 5 articles |
M. Angela Sasse | 5 articles |
Peter Neumann | 5 articles |
Thorsten Holz | 5 articles |
Anderson Rocha | 5 articles |
Michael Franz | 5 articles |
Wojciech Mazurczyk | 5 articles |
Robert Cunningham | 5 articles |
Patrick Traynor | 5 articles |
Amir Herzberg | 5 articles |
Alan Sherman | 5 articles |
Michael Bailey | 5 articles |
Giovanni Vigna | 5 articles |
Rolf Oppliger | 5 articles |
Nir Kshetri | 5 articles |
Charles Pfleeger | 5 articles |
Deirdre Mulligan | 5 articles |
Alessandro Acquisti | 5 articles |
Matt Blaze | 5 articles |
Alec Yasinsac | 5 articles |
Marco Ramilli | 5 articles |
Gregory Conti | 5 articles |
Bret Michael | 5 articles |
Angelos Keromytis | 5 articles |
William Allen | 5 articles |
Laurianne McLaughlin | 5 articles |
Mathias Payer | 4 articles |
Katja Tuma | 4 articles |
Eric Bodden | 4 articles |
Franziska Roesner | 4 articles |
Kenneth Paterson | 4 articles |
Feng Hao | 4 articles |
Yasemin Acar | 4 articles |
Sascha Fahl | 4 articles |
Per Larsen | 4 articles |
Jianying Zhou | 4 articles |
Emiliano De Cristofaro | 4 articles |
Elissa Redmiles | 4 articles |
Frank Piessens | 4 articles |
Alvaro Cárdenas | 4 articles |
Steve Lipner | 4 articles |
Gene Tsudik | 4 articles |
Douglas Stebila | 4 articles |
Matthew Smith | 4 articles |
Mohammad Mannan | 4 articles |
James Bret Michael | 4 articles |
Atul Prakash | 4 articles |
Steffen Wendzel | 4 articles |
Alfred Menezes | 4 articles |
Philip Stark | 4 articles |
Vanessa Teague | 4 articles |
Farinaz Koushanfar | 4 articles |
Yuval Elovici | 4 articles |
José Luis Hernández-Ramos | 4 articles |
Ghada Dessouky | 4 articles |
Katrine Evans | 4 articles |
Aleksander Essex | 4 articles |
Sunny Consolvo | 4 articles |
Michele Mosca | 4 articles |
Sherali Zeadally | 4 articles |
Michael Thompson | 4 articles |
Aisling Connolly | 4 articles |
Ulf Lindqvist | 4 articles |
Deanna Caputo | 4 articles |
Bill Horne | 4 articles |
Jim Alves-Foss | 4 articles |
Stephen McLaughlin | 4 articles |
Zbigniew Kalbarczyk | 4 articles |
Marco Carvalho | 4 articles |
Martina Angela Sasse | 4 articles |
William Arbaugh | 4 articles |
Julie Ryan | 4 articles |
Anup Ghosh | 4 articles |
Fred Cate | 4 articles |
Vincent Rijmen | 4 articles |
Eric Goetz | 4 articles |
Santiago Torres-Arias | 3 articles |
Javier López | 3 articles |
Luigi Lo Iacono | 3 articles |
Murat Kantarcioglu | 3 articles |
Carl Gunter | 3 articles |
David Kotz | 3 articles |
Julie Haney | 3 articles |
Apu Kapadia | 3 articles |
Pavel Gladyshev | 3 articles |
Dan Wallach | 3 articles |
Ivan Pashchenko | 3 articles |
Dawn Song | 3 articles |
Cristina Cifuentes | 3 articles |
Vincent Lenders | 3 articles |
Irfan Ahmed | 3 articles |
Arvind Narayanan | 3 articles |
Hilarie Orman | 3 articles |
Adam Shostack | 3 articles |
Florian Skopik | 3 articles |
Max Landauer | 3 articles |
Markus Wurzenberger | 3 articles |
David Basin | 3 articles |
Cas Cremers | 3 articles |
Josiah Dykstra | 3 articles |
Gail-Joon Ahn | 3 articles |
Jens Grossklags | 3 articles |
Blair Taylor | 3 articles |
Fariborz Farahmand | 3 articles |
Samuel King | 3 articles |
Angelos Stavrou | 3 articles |
Asaf Shabtai | 3 articles |
Antonio Skarmeta | 3 articles |
Michelle Mazurek | 3 articles |
N. Asokan | 3 articles |
Inger Anne Tøndel | 3 articles |
Martin Gilje Jaatun | 3 articles |
Steven Myers | 3 articles |
Alexander Kott | 3 articles |
Stuart Schechter | 3 articles |
Tyler Moore | 3 articles |
Rakesh Verma | 3 articles |
Linda Oliva | 3 articles |
Enis Golaszewski | 3 articles |
Omer Tene | 3 articles |
Dan Boneh | 3 articles |
Kevin Butler | 3 articles |
Vincent Nicomette | 3 articles |
Elie Bursztein | 3 articles |
Diego Aranha | 3 articles |
Johannes Buchmann | 3 articles |
Kristin Lauter | 3 articles |
Ghassan Karame | 3 articles |
Vassil Roussev | 3 articles |
Anh Nguyen-Tuong | 3 articles |
Jack Davidson | 3 articles |
Jason Hiser | 3 articles |
Brian Randell | 3 articles |
Richard Chow | 3 articles |
Benny Pinkas | 3 articles |
Robert Reeder | 3 articles |
Shaza Zeitouni | 3 articles |
Thomas Ristenpart | 3 articles |
Peter Ryan | 3 articles |
Steve Schneider | 3 articles |
Hartmut König | 3 articles |
Budi Arief | 3 articles |
Marc Beunardeau | 3 articles |
Rémi Géraud | 3 articles |
Julian Williams | 3 articles |
Jeffrey Voas | 3 articles |
D. Richard Kuhn | 3 articles |
Jungwoo Ryoo | 3 articles |
Nasir Memon | 3 articles |
Steven Murdoch | 3 articles |
Ravishankar Iyer | 3 articles |
Jeffrey MacKie-Mason | 3 articles |
Yves Deswarte | 3 articles |
Gregory White | 3 articles |
Nicolas Sklavos | 3 articles |
Hugh Thompson | 3 articles |
Marco Prandini | 3 articles |
Marit Hansen | 3 articles |
Lance Hoffman | 3 articles |
Tara Whalen | 3 articles |
Dorothy Denning | 3 articles |
Peter Kuper | 3 articles |
Brad Arkin | 3 articles |
David Evans | 3 articles |
Peter Gutmann | 3 articles |
Franco Callegati | 3 articles |
Fred Cohen | 3 articles |
Luther Martin | 3 articles |
Lars-Helge Netland | 3 articles |
Julia Brande Earp | 3 articles |
O. Sami Saydjari | 3 articles |
Ramaswamy Chandramouli | 3 articles |
Kara Nance | 3 articles |
Justin Troutman | 3 articles |
Edward Sobiesk | 3 articles |
André Klingsheim | 3 articles |
Vebjørn Moen | 3 articles |
Paulo Veríssimo | 3 articles |
William Burr | 3 articles |
Barry Mullins | 3 articles |
Whitfield Diffie | 3 articles |
Eugene Spafford | 3 articles |
Vanessa Gratzer | 3 articles |
Stephen Weis | 3 articles |
Nancy Fontaine | 3 articles |
Frédéric Raynal | 3 articles |
Ronald Dodge | 3 articles |
Daniel Ragsdale | 3 articles |
Garrett Jones | 3 articles |
Bill McCarty | 3 articles |
Güliz Seray Tuncay | 2 articles |
Abbas Acar | 2 articles |
Riccardo Lazzeretti | 2 articles |
Liliana Pasquale | 2 articles |
Péter Hegedüs | 2 articles |
Tamara Lopez | 2 articles |
Bashar Nuseibeh | 2 articles |
Nathan Burow | 2 articles |
Bhaskar Prasad Rimal | 2 articles |
Abdul Majeed | 2 articles |
Seong Oun Hwang | 2 articles |
David Clark | 2 articles |
kc claffy | 2 articles |
Cristina Alcaraz | 2 articles |
Brian Weber | 2 articles |
Zhenpeng Shi | 2 articles |
David Starobinski | 2 articles |
Alice Hutchings | 2 articles |
Roberto Baldoni | 2 articles |
Peng Liu | 2 articles |
Zaina Dkaidek | 2 articles |
Pamela Wisniewski | 2 articles |
Kenneth Crowther | 2 articles |
Yang Wang | 2 articles |
Filipo Sharevski | 2 articles |
Karen Renaud | 2 articles |
Roberto Natella | 2 articles |
Domenico Cotroneo | 2 articles |
Florian Alt | 2 articles |
Francis Kofi Andoh-Baidoo | 2 articles |
Mikko Siponen | 2 articles |
William Robertson | 2 articles |
Jan-Erik Ekberg | 2 articles |
Daniel Moreira | 2 articles |
Sébastien Marcel | 2 articles |
Gang Tan | 2 articles |
Nele Mentens | 2 articles |
Serena Elisa Ponta | 2 articles |
Michele Bezzi | 2 articles |
Ákos Milánkovich | 2 articles |
Kenny Paterson | 2 articles |
Florian Schaub | 2 articles |
Marco Angelini | 2 articles |
Mauro Conti | 2 articles |
A. Selcuk Uluagac | 2 articles |
Musard Balliu | 2 articles |
Mathias Ekstedt | 2 articles |
Nusrat Zahan | 2 articles |
Andreas Ekelhart | 2 articles |
Sebastian Obermeier | 2 articles |
Feargus Pendlebury | 2 articles |
Fabio Pierazzi | 2 articles |
Lorenzo Cavallaro | 2 articles |
Nigel Smart | 2 articles |
Saman Zonouz | 2 articles |
Rodrigo Roman | 2 articles |
Gregory Shannon | 2 articles |
Gabriela Ciocarlie | 2 articles |
Cynthia Sturton | 2 articles |
Andres Meza | 2 articles |
Francesco Restuccia | 2 articles |
Ryan Kastner | 2 articles |
Kacper Gradon | 2 articles |
Michael Reiter | 2 articles |
Lorrie Cranor | 2 articles |
Crispin Cowan | 2 articles |
Kami Vaniea | 2 articles |
Charles Weir | 2 articles |
Danfeng Daphne Yao | 2 articles |
Nathan Keynes | 2 articles |
Barton Miller | 2 articles |
Elisa Heymann | 2 articles |
Nir Drucker | 2 articles |
Toby Murray | 2 articles |
Battista Biggio | 2 articles |
Adam Oest | 2 articles |
Frank Breitinger | 2 articles |
Roberto Di Pietro | 2 articles |
Gerwin Klein | 2 articles |
Alexandros Kapravelos | 2 articles |
Ruoyu Wang | 2 articles |
Yan Shoshitaishvili | 2 articles |
Daniel Woods | 2 articles |
Rainer Böhme | 2 articles |
Joseph Hallett | 2 articles |
Joshua James | 2 articles |
Irena Bojanova | 2 articles |
Peter Mell | 2 articles |
Jules Polonetsky | 2 articles |
Hongxin Hu | 2 articles |
Wenke Lee | 2 articles |
Josh Benaloh | 2 articles |
M. Sadegh Riazi | 2 articles |
Allen Householder | 2 articles |
Nolen Scaife | 2 articles |
Christian Peeters | 2 articles |
Kent Seamons | 2 articles |
Sara Nieves Matheu-García | 2 articles |
Adi Shamir | 2 articles |
Siamak Shahandashti | 2 articles |
Roy Maxion | 2 articles |
Rock Stevens | 2 articles |
Phyllis Schneck | 2 articles |
Daniel Gruss | 2 articles |
Kari Kostiainen | 2 articles |
Patrick Jauernig | 2 articles |
Emmanuel Stapf | 2 articles |
Eric Osterweil | 2 articles |
Howard Shrobe | 2 articles |
Ryan Henry | 2 articles |
Andrew Miller | 2 articles |
Frank Stajano | 2 articles |
Gernot Heiser | 2 articles |
Herbert Bos | 2 articles |
Cristiano Giuffrida | 2 articles |
Philip O'Kane | 2 articles |
Sakir Sezer | 2 articles |
Andrew Grotto | 2 articles |
Michel van Eeten | 2 articles |
Peter Peterson | 2 articles |
Bita Darvish Rouhani | 2 articles |
Dale Peterson | 2 articles |
Nicolas Papernot | 2 articles |
Z. Berkay Celik | 2 articles |
Chris Culnane | 2 articles |
Eric Alata | 2 articles |
Adam Bates | 2 articles |
Elizabeth Churchill | 2 articles |
Tara Matthews | 2 articles |
Wouter Joosen | 2 articles |
Sanjay Sarma | 2 articles |
Jeroen van de Graaf | 2 articles |
Raheem Beyah | 2 articles |
Paulo Jorge Esteves Veríssimo | 2 articles |
John McLean | 2 articles |
George Danezis | 2 articles |
Engin Kirda | 2 articles |
Michele Co | 2 articles |
William Hawkins | 2 articles |
Michael Zhivich | 2 articles |
Chris Eagle | 2 articles |
Sarah Spiekermann | 2 articles |
Vern Paxson | 2 articles |
Joel Reardon | 2 articles |
Serge Egelman | 2 articles |
David Wagner | 2 articles |
Shay Gueron | 2 articles |
Jean-Pierre Hubaux | 2 articles |
Bradley Malin | 2 articles |
Earlence Fernandes | 2 articles |
Amir Rahmati | 2 articles |
Sai Teja Peddinti | 2 articles |
XiaoFeng Wang | 2 articles |
Marc Dacier | 2 articles |
Frank Kargl | 2 articles |
Sven Dietrich | 2 articles |
Aad van Moorsel | 2 articles |
Mark Gondree | 2 articles |
Zachary Peterson | 2 articles |
Yee-Yin Choong | 2 articles |
David Archer | 2 articles |
Matthew Green | 2 articles |
Aditya Sood | 2 articles |
Logan Mailloux | 2 articles |
Wolter Pieters | 2 articles |
Rubén Trapero | 2 articles |
Massimo Felici | 2 articles |
Nick Wainwright | 2 articles |
Simona Cavallini | 2 articles |
Fabio Bisogni | 2 articles |
Paul Syverson | 2 articles |
Felix Freiling | 2 articles |
Alexandra Shulman-Peleg | 2 articles |
Jia Song | 2 articles |
Per Håkon Meland | 2 articles |
Ross Koppel | 2 articles |
Sören Preibusch | 2 articles |
Masooda Bashir | 2 articles |
Jared DeMott | 2 articles |
Stephen Zaccaro | 2 articles |
Reeshad Dalal | 2 articles |
Lois Tetrick | 2 articles |
John Knight | 2 articles |
Denise Anthony | 2 articles |
Wenliang Du | 2 articles |
Tamara Denning | 2 articles |
Liam Mayron | 2 articles |
Frederik Zuiderveen Borgesius | 2 articles |
Virgil Gligor | 2 articles |
Abhi Shelat | 2 articles |
Mike Bond | 2 articles |
Stefan Brunthaler | 2 articles |
Mohd Azeem Bin Adzmi | 2 articles |
Serge Vaudenay | 2 articles |
Rahul Telang | 2 articles |
Michael Grimaila | 2 articles |
Benjamin Edelman | 2 articles |
Pratyusa Manadhata | 2 articles |
Himanshu Khurana | 2 articles |
Christopher Kruegel | 2 articles |
Vashek Matyas | 2 articles |
Anna Slomovic | 2 articles |
Diana Maimut | 2 articles |
William Sanders | 2 articles |
Meredith Patterson | 2 articles |
Anna Shubina | 2 articles |
Rick Wash | 2 articles |
Alysson Neves Bessani | 2 articles |
Thomas Hilburn | 2 articles |
Kelly Caine | 2 articles |
Keith Harrison | 2 articles |
Altair Olivo Santin | 2 articles |
Douglas Maughan | 2 articles |
Jostein Jensen | 2 articles |
José Alcaraz Calero | 2 articles |
Sandy Clark | 2 articles |
Eric Grosse | 2 articles |
Edward Amoroso | 2 articles |
Eugene Vasserman | 2 articles |
Krishna Venkatasubramanian | 2 articles |
Oleg Sokolsky | 2 articles |
Insup Lee | 2 articles |
Ang Cui | 2 articles |
Frederick Sheldon | 2 articles |
Jose Nazario | 2 articles |
Randy Marchany | 2 articles |
Helena Handschuh | 2 articles |
Jeremiah Grossman | 2 articles |
A searchable selection of 0 interesting, educative, thought-provoking, or contraversial quotes.

Here you will find word clouds for each decade. Word clouds are generated from terms used in titles of articles.
Contact
![]() | This site is curated and maintained by Zeljko Obrenovic (@zeljko_obren). Contact him for any questions or suggestions. |