


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 11
Volume 11, Number 1, January - February 2014
- Elisa Bertino:

Editorial. 1 - Hannes Holm

:
A Large-Scale Study of the Time Required to Compromise a Computer System. 2-15 - Leandro Fiorin, Mariagiovanna Sami:

Fault-Tolerant Network Interfaces for Networks-on-Chip. 16-29 - Lingyu Wang, Sushil Jajodia

, Anoop Singhal, Pengsu Cheng, Steven Noel:
k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities. 30-44 - Satya Gautam Vadlamudi, Partha Pratim Chakrabarti:

Robustness Analysis of Embedded Control Systems with Respect to Signal Perturbations: Finding Minimal Counterexamples Using Fault Injection. 45-58 - Noman Mohammed, Dima Alhadidi, Benjamin C. M. Fung

, Mourad Debbabi
:
Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data. 59-71 - Nicola Basilico

, Nicola Gatti
, Mattia Monga
, Sabrina Sicari:
Security Games for Node Localization through Verifiable Multilateration. 72-85
Volume 11, Number 2, March - April 2014
- José Fonseca

, Nuno Seixas
, Marco Vieira
, Henrique Madeira
:
Analysis of Field Data on Web Security Vulnerabilities. 89-100 - Xin Li, Xinyuan Wang, Wentao Chang:

CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution. 101-114 - Qinghua Li, Guohong Cao, Thomas F. La Porta:

Efficient and Privacy-Aware Data Aggregation in Mobile Sensing. 115-129 - Jing Zhao, Kishor S. Trivedi, Michael Grottke

, Javier Alonso, Yanbin Wang:
Ensuring the Performance of Apache HTTP Server Affected by Aging. 130-141 - Gorrell P. Cheek, Mohamed Shehab

:
Human Effects of Enhanced Privacy Management Models. 142-154 - Xun Yi, Elisa Bertino, Jaideep Vaidya, Chaoping Xing

:
Private Searching on Streaming Data Based on Keyword Frequency. 155-167 - Hussain M. J. Almohri

, Danfeng Yao
, Dennis G. Kafura:
Process Authentication for High System Assurance. 168-180 - Yang Qin, Dijiang Huang

, Bing Li:
STARS: A Statistical Traffic Pattern Discovery System for MANETs. 181-192 - Kizito Salako

, Lorenzo Strigini:
When Does "Diversity" in Development Reduce Common Failures? Insights from Probabilistic Modeling. 193-206
Volume 11, Number 3, May - June 2014
- Yury Zhauniarovich, Giovanni Russello, Mauro Conti

, Bruno Crispo, Earlence Fernandes:
MOSES: Supporting and Enforcing Security Profiles on Smartphones. 211-223 - Adam Skillen, Mohammad Mannan:

Mobiflage: Deniable Storage Encryptionfor Mobile Devices. 224-237 - Christopher S. Gates, Ninghui Li, Hao Peng, Bhaskar Pratim Sarma, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy:

Generating Summary Risk Scores for Mobile Applications. 238-251 - Christopher S. Gates, Jing Chen, Ninghui Li, Robert W. Proctor:

Effective Risk Communication for Android Apps. 252-265 - Reza Shokri

, George Theodorakopoulos
, Panos Papadimitratos
, Ehsan Kazemi
, Jean-Pierre Hubaux:
Hiding in the Mobile Crowd: LocationPrivacy through Collaboration. 266-279 - Alessio Merlo, Mauro Migliardi

, Nicola Gobbo, Francesco Palmieri
, Aniello Castiglione
:
A Denial of Service Attack to UMTS Networks Using SIM-Less Devices. 280-291 - Younho Lee

:
Secure Ordered Bucketization. 292-303
Volume 11, Number 4, July - August 2014
- Silvio Cesare, Yang Xiang

, Wanlei Zhou
:
Control Flow-Based Malware VariantDetection. 307-317 - Pietro Colombo

, Elena Ferrari
:
Enforcing Obligations within RelationalDatabase Management Systems. 318-331 - Fengwei Zhang, Jiang Wang, Kun Sun, Angelos Stavrou

:
HyperCheck: A Hardware-AssistedIntegrity Monitor. 332-344 - Shu Yin, Xiaojun Ruan, Adam Manzanares, Xiao Qin

, Kenli Li:
MINT: A Reliability Modeling Frameworkfor Energy-Efficient Parallel Disk Systems. 345-360 - Sheng Wen

, Wei Zhou, Jun Zhang
, Yang Xiang
, Wanlei Zhou
, Weijia Jia
, Cliff C. Zou:
Modeling and Analysis on the Propagation Dynamics of Modern Email Malware. 361-374 - Ruofan Xia, Xiaoyan Yin, Javier Alonso Lopez, Fumio Machida, Kishor S. Trivedi:

Performance and Availability Modeling of ITSystems with Data Backup and Restore. 375-389 - Wenhong Tian, Yu Chen, Xinyang Wang:

A Note on "Orchestrating an Ensemble of MapReduce Jobs for Minimizing Their Makespan". 390-391 - Kyuseung Han, Ganghee Lee, Kiyoung Choi:

Software-Level Approaches for Tolerating Transient Faults in a Coarse-GrainedReconfigurable Architecture. 392-398
Volume 11, Number 5, September - October 2014
- Jaideep Vaidya, Basit Shafiq, Wei Fan, Danish Mehmood, David Lorenzi:

A Random Decision Tree Framework for Privacy-Preserving Data Mining. 399-411 - Puneet Gupta

, Scott D. Stoller, Zhongyuan Xu:
Abductive Analysis of Administrative Policies in Rule-Based Access Control. 412-424 - Marc Liberatore, Brian Neil Levine, Clay Shields, Brian Lynn:

Efficient Tagging of Remote Peers during Child Pornography Investigations. 425-439 - José Fonseca

, Marco Vieira
, Henrique Madeira
:
Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection. 440-453 - Kwantae Cho, Byung-Gil Lee, Dong Hoon Lee:

Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks. 454-466 - Yogachandran Rahulamathavan

, Raphael Chung-Wei Phan
, Suresh Veluru, Kanapathippillai Cumanan, Muttukrishnan Rajarajan:
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud. 467-479 - Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose, Paul C. van Oorschot

:
Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion. 480-493 - Libor Polcak, Jakub Jirasek, Petr Matousek

:
Comment on "Remote Physical Device Fingerprinting". 494-496
Volume 11, Number 6, November - December 2014
- Lotfi Ben Othmane, Pelin Angin

, Harold Weffers, Bharat K. Bhargava:
Extending the Agile Development Process to Develop Acceptably Secure Software. 497-509 - Sabrina De Capitani di Vimercati

, Sara Foresti
, Sushil Jajodia
, Giovanni Livraga
, Stefano Paraboschi
, Pierangela Samarati
:
Fragmentation in Presence of Data Dependencies. 510-523 - Jianzhong Huang, Xiao Qin

, Fenghao Zhang, Wei-Shinn Ku
, Changsheng Xie:
MFTS: A Multi-Level Fault-Tolerant Archiving Storage with Optimized Maintenance Bandwidth. 524-537 - Wen Ming Liu, Lingyu Wang, Pengsu Cheng, Kui Ren

, Shunzhi Zhu, Mourad Debbabi
:
PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications. 538-552 - Christophe Foket, Bjorn De Sutter, Koen De Bosschere:

Pushing Java Type Obfuscation to the Limit. 553-567 - Jin Tang, Yu Cheng

, Yong Hao, Wei Song:
SIP Flooding Attack Detection with a Multi-Dimensional Sketch Design. 582-595

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














