obren.io / 359°

History of Security & Privacy in 131 Chapters

About

  • This is a curated and experimental site, offering historical and visual index of all collected sources.
  • The site does not host any of the files. It only provides an index and links to full text files.
  • Full text of many sources is behind a paywall. You may need to obtain a subscription to read full text.

Latest Issue

2024
2024, no. 5: Inclusive Privacy and Security

Latest Issue:
Inclusive Privacy and Security

  • The Art of Inclusive Gamification in Cybersecurity Training
  • Bridging the Cybersecurity Skills Gap: Knowledge Framework Comparative Study
  • It's Still Complicated: From Privacy-Invasive Parental Control to Teen-Centric Solutions for Digital Resilience
  • Blending Shared Responsibility and Zero Trust to Secure the Industrial Internet of Things
  • Inclusive Privacy and Security
  • ...

History

·
2023
2023, no. 5: A Medley of Security and Privacy

A Year Ago:
A Medley of Security and Privacy

  • What's Driving Conflicts Around Differential Privacy for the U.S. Census
  • Automating Recovery in Mixed Operation Technology/IT Critical Infrastructures
  • Rectification of Syntactic and Semantic Privacy Mechanisms
  • Lessons Learned on Machine Learning for Computer Security
  • An Analysis of European Union Cybersecurity Higher Education Programs Through the Crowd-Sourced Database CyberHEAD
  • ...
·
·
·
·
2019
2019, no. 5: The IoT and Security and Privacy

5 Years Ago:
The IoT and Security and Privacy

  • Cyberphysical Security for the Masses: A Survey of the Internet Protocol Suite for Internet of Things Security
  • The Internet of Things: Security Challenges
  • The Five Safes of Risk-Based Anonymization
  • Applying Resilience to Hybrid Threats
  • Stealing, Spying, and Abusing: Consequences of Attacks on Internet of Things Devices
  • ...
·
·
·
·
·
2014
2014, no. 5: Computer Security Incident Response Teams (CSIRTs)

10 Years Ago:
Computer Security Incident Response Teams (CSIRTs)

  • On Computer Security Incident Response Teams
  • The Future of Incident Response
  • Building Reliable and Secure Virtual Machines Using Architectural Invariants
  • Expanding to Meet Readers' Needs
  • An Organizational Psychology Perspective to Examining Computer Security Incident Response Teams
  • ...
·
·
·
·
·
2009
2009, no. 5: Securing the Domain Name System

15 Years Ago:
Securing the Domain Name System

  • Wireless Malware Propagation: A Reality Check
  • Risk Concentration
  • Incentives to Innovate: Improve the Past or Break with It?
  • Silver Bullet Talks with Bob Blakley
  • Managing the Security Wall of Data
  • ...
·
·
·
·
·
2004
2004, no. 5: Usability & Security

20 Years Ago:
Usability & Security

  • Letters to the Editor
  • Multilevel Security: Reprise
  • Speech Privacy Technophobes Need Not Apply
  • Time Out for Station Identification
  • In Search of Usable Security: Five Lessons from the Field
  • ...
·
·
2003
2003, no. 1: Fact over Fiction

Premiere Issue:
Fact over Fiction

  • What Is Computer Security?
  • A Critical Need, An Ambitious Mission, A New Magazine
  • Software Security for Open-Source Systems
  • AI Bites Man?
  • Copyright Extension: Eldred v. Ashcroft
  • ...