default search action
IEEE Transactions on Dependable and Secure Computing, Volume 11
Volume 11, Number 1, January - February 2014
- Elisa Bertino:
Editorial. 1 - Hannes Holm:
A Large-Scale Study of the Time Required to Compromise a Computer System. 2-15 - Leandro Fiorin, Mariagiovanna Sami:
Fault-Tolerant Network Interfaces for Networks-on-Chip. 16-29 - Lingyu Wang, Sushil Jajodia, Anoop Singhal, Pengsu Cheng, Steven Noel:
k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities. 30-44 - Satya Gautam Vadlamudi, Partha Pratim Chakrabarti:
Robustness Analysis of Embedded Control Systems with Respect to Signal Perturbations: Finding Minimal Counterexamples Using Fault Injection. 45-58 - Noman Mohammed, Dima Alhadidi, Benjamin C. M. Fung, Mourad Debbabi:
Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data. 59-71 - Nicola Basilico, Nicola Gatti, Mattia Monga, Sabrina Sicari:
Security Games for Node Localization through Verifiable Multilateration. 72-85
Volume 11, Number 2, March - April 2014
- José Fonseca, Nuno Seixas, Marco Vieira, Henrique Madeira:
Analysis of Field Data on Web Security Vulnerabilities. 89-100 - Xin Li, Xinyuan Wang, Wentao Chang:
CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution. 101-114 - Qinghua Li, Guohong Cao, Thomas F. La Porta:
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing. 115-129 - Jing Zhao, Kishor S. Trivedi, Michael Grottke, Javier Alonso, Yanbin Wang:
Ensuring the Performance of Apache HTTP Server Affected by Aging. 130-141 - Gorrell P. Cheek, Mohamed Shehab:
Human Effects of Enhanced Privacy Management Models. 142-154 - Xun Yi, Elisa Bertino, Jaideep Vaidya, Chaoping Xing:
Private Searching on Streaming Data Based on Keyword Frequency. 155-167 - Hussain M. J. Almohri, Danfeng Yao, Dennis G. Kafura:
Process Authentication for High System Assurance. 168-180 - Yang Qin, Dijiang Huang, Bing Li:
STARS: A Statistical Traffic Pattern Discovery System for MANETs. 181-192 - Kizito Salako, Lorenzo Strigini:
When Does "Diversity" in Development Reduce Common Failures? Insights from Probabilistic Modeling. 193-206
Volume 11, Number 3, May - June 2014
- Yury Zhauniarovich, Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes:
MOSES: Supporting and Enforcing Security Profiles on Smartphones. 211-223 - Adam Skillen, Mohammad Mannan:
Mobiflage: Deniable Storage Encryptionfor Mobile Devices. 224-237 - Christopher S. Gates, Ninghui Li, Hao Peng, Bhaskar Pratim Sarma, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy:
Generating Summary Risk Scores for Mobile Applications. 238-251 - Christopher S. Gates, Jing Chen, Ninghui Li, Robert W. Proctor:
Effective Risk Communication for Android Apps. 252-265 - Reza Shokri, George Theodorakopoulos, Panos Papadimitratos, Ehsan Kazemi, Jean-Pierre Hubaux:
Hiding in the Mobile Crowd: LocationPrivacy through Collaboration. 266-279 - Alessio Merlo, Mauro Migliardi, Nicola Gobbo, Francesco Palmieri, Aniello Castiglione:
A Denial of Service Attack to UMTS Networks Using SIM-Less Devices. 280-291 - Younho Lee:
Secure Ordered Bucketization. 292-303
Volume 11, Number 4, July - August 2014
- Silvio Cesare, Yang Xiang, Wanlei Zhou:
Control Flow-Based Malware VariantDetection. 307-317 - Pietro Colombo, Elena Ferrari:
Enforcing Obligations within RelationalDatabase Management Systems. 318-331 - Fengwei Zhang, Jiang Wang, Kun Sun, Angelos Stavrou:
HyperCheck: A Hardware-AssistedIntegrity Monitor. 332-344 - Shu Yin, Xiaojun Ruan, Adam Manzanares, Xiao Qin, Kenli Li:
MINT: A Reliability Modeling Frameworkfor Energy-Efficient Parallel Disk Systems. 345-360 - Sheng Wen, Wei Zhou, Jun Zhang, Yang Xiang, Wanlei Zhou, Weijia Jia, Cliff C. Zou:
Modeling and Analysis on the Propagation Dynamics of Modern Email Malware. 361-374 - Ruofan Xia, Xiaoyan Yin, Javier Alonso Lopez, Fumio Machida, Kishor S. Trivedi:
Performance and Availability Modeling of ITSystems with Data Backup and Restore. 375-389 - Wenhong Tian, Yu Chen, Xinyang Wang:
A Note on "Orchestrating an Ensemble of MapReduce Jobs for Minimizing Their Makespan". 390-391 - Kyuseung Han, Ganghee Lee, Kiyoung Choi:
Software-Level Approaches for Tolerating Transient Faults in a Coarse-GrainedReconfigurable Architecture. 392-398
Volume 11, Number 5, September - October 2014
- Jaideep Vaidya, Basit Shafiq, Wei Fan, Danish Mehmood, David Lorenzi:
A Random Decision Tree Framework for Privacy-Preserving Data Mining. 399-411 - Puneet Gupta, Scott D. Stoller, Zhongyuan Xu:
Abductive Analysis of Administrative Policies in Rule-Based Access Control. 412-424 - Marc Liberatore, Brian Neil Levine, Clay Shields, Brian Lynn:
Efficient Tagging of Remote Peers during Child Pornography Investigations. 425-439 - José Fonseca, Marco Vieira, Henrique Madeira:
Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection. 440-453 - Kwantae Cho, Byung-Gil Lee, Dong Hoon Lee:
Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks. 454-466 - Yogachandran Rahulamathavan, Raphael Chung-Wei Phan, Suresh Veluru, Kanapathippillai Cumanan, Muttukrishnan Rajarajan:
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud. 467-479 - Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose, Paul C. van Oorschot:
Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion. 480-493 - Libor Polcak, Jakub Jirasek, Petr Matousek:
Comment on "Remote Physical Device Fingerprinting". 494-496
Volume 11, Number 6, November - December 2014
- Lotfi Ben Othmane, Pelin Angin, Harold Weffers, Bharat K. Bhargava:
Extending the Agile Development Process to Develop Acceptably Secure Software. 497-509 - Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
Fragmentation in Presence of Data Dependencies. 510-523 - Jianzhong Huang, Xiao Qin, Fenghao Zhang, Wei-Shinn Ku, Changsheng Xie:
MFTS: A Multi-Level Fault-Tolerant Archiving Storage with Optimized Maintenance Bandwidth. 524-537 - Wen Ming Liu, Lingyu Wang, Pengsu Cheng, Kui Ren, Shunzhi Zhu, Mourad Debbabi:
PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications. 538-552 - Christophe Foket, Bjorn De Sutter, Koen De Bosschere:
Pushing Java Type Obfuscation to the Limit. 553-567 - Jin Tang, Yu Cheng, Yong Hao, Wei Song:
SIP Flooding Attack Detection with a Multi-Dimensional Sketch Design. 582-595
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.