
Search dblp for Publications
export results for "stream:streams/journals/tdsc:"
@article{DBLP:journals/tdsc/0001BOM21, author = {Omar Abdel Wahab and Jamal Bentahar and Hadi Otrok and Azzam Mourad}, title = {Resource-Aware Detection and Defense System against Multi-Type Attacks in the Cloud: Repeated Bayesian Stackelberg Game}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {605--622}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2907946}, doi = {10.1109/TDSC.2019.2907946}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/0001BOM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0001LJ21, author = {Tianhao Wang and Ninghui Li and Somesh Jha}, title = {Locally Differentially Private Heavy Hitter Identification}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {982--993}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2927695}, doi = {10.1109/TDSC.2019.2927695}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/0001LJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0002DB021, author = {Yinghui Zhang and Robert H. Deng and Elisa Bertino and Dong Zheng}, title = {Robust and Universal Seamless Handover Authentication in 5G HetNets}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {858--874}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2927664}, doi = {10.1109/TDSC.2019.2927664}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/0002DB021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0002JKPSS21, author = {Tanmoy Chakraborty and Sushil Jajodia and Jonathan Katz and Antonio Picariello and Giancarlo Sperl{\`{\i}} and V. S. Subrahmanian}, title = {A Fake Online Repository Generation Engine for Cyber Deception}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {518--533}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2898661}, doi = {10.1109/TDSC.2019.2898661}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/0002JKPSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0005TYSB21, author = {Long Cheng and Ke Tian and Danfeng Daphne Yao and Lui Sha and Raheem A. Beyah}, title = {Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {825--842}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2906161}, doi = {10.1109/TDSC.2019.2906161}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/0005TYSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/002400C021, author = {Jing Zhang and Jie Cui and Hong Zhong and Zhili Chen and Lu Liu}, title = {{PA-CRT:} Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {722--735}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2904274}, doi = {10.1109/TDSC.2019.2904274}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/002400C021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/00250WHY00D21, author = {Yue Zhang and Jian Weng and Jia{-}Si Weng and Lin Hou and Anjia Yang and Ming Li and Yang Xiang and Robert H. Deng}, title = {Looking Back! Using Early Versions of Android Apps as Attack Vectors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {652--666}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2914202}, doi = {10.1109/TDSC.2019.2914202}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/00250WHY00D21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AdepuM21, author = {Sridhar Adepu and Aditya Mathur}, title = {Distributed Attack Detection in a Water Treatment Plant: Method and Case Study}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {86--99}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2875008}, doi = {10.1109/TDSC.2018.2875008}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/AdepuM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Al-NaamiEIKTHAR21, author = {Khaled Al{-}Naami and Amir El{-}Ghamry and Md Shihabul Islam and Latifur Khan and Bhavani M. Thuraisingham and Kevin W. Hamlen and Mohammed AlRahmawy and Magdi Zakria Rashad}, title = {BiMorphing: {A} Bi-Directional Bursting Defense against Website Fingerprinting Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {505--517}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2907240}, doi = {10.1109/TDSC.2019.2907240}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/Al-NaamiEIKTHAR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AlacaAO21, author = {Furkan Alaca and AbdelRahman Abdou and Paul C. van Oorschot}, title = {Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {534--549}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2908907}, doi = {10.1109/TDSC.2019.2908907}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/AlacaAO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AlamTRM21, author = {Kazi Md. Rokibul Alam and Shinsuke Tamura and S. M. Saifur Rahman and Yasuhiko Morimoto}, title = {An Electronic Voting Scheme Based on Revised-SVRM and Confirmation Numbers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {400--410}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2892465}, doi = {10.1109/TDSC.2019.2892465}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/AlamTRM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BanerjeeSAC21, author = {Suvadeep Banerjee and Balavinayagam Samynathan and Jacob A. Abraham and Abhijit Chatterjee}, title = {Real-Time Error Detection in Nonlinear Control Systems Using Machine Learning Assisted State-Space Encoding}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {576--592}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2903049}, doi = {10.1109/TDSC.2019.2903049}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/BanerjeeSAC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BhattacharjeeD21, author = {Shameek Bhattacharjee and Sajal K. Das}, title = {Detection and Forensics against Stealthy Data Falsification in Smart Metering Infrastructure}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {356--371}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2889729}, doi = {10.1109/TDSC.2018.2889729}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/BhattacharjeeD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BogaertsLJ21, author = {Jasper Bogaerts and Bert Lagaisse and Wouter Joosen}, title = {{SEQUOIA:} {A} Middleware Supporting Policy-Based Access Control for Search and Aggregation in Data-Driven Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {325--339}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2889309}, doi = {10.1109/TDSC.2018.2889309}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/BogaertsLJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BowersLSLSH21, author = {Adam Bowers and Cong Liao and Douglas Steiert and Dan Lin and Anna Cinzia Squicciarini and Ali R. Hurson}, title = {Detecting Suspicious File Migration or Replication in the Cloud}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {296--309}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2885271}, doi = {10.1109/TDSC.2018.2885271}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/BowersLSLSH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CaiWYW21, author = {Chengjun Cai and Jian Weng and Xingliang Yuan and Cong Wang}, title = {Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {131--144}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2877332}, doi = {10.1109/TDSC.2018.2877332}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/CaiWYW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CaseyBY21, author = {Peter Casey and Ibrahim M. Baggili and Ananya Yarramreddy}, title = {Immersive Virtual Reality Attacks and the Human Joystick}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {550--562}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2907942}, doi = {10.1109/TDSC.2019.2907942}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/CaseyBY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CerfBRMPMBC21, author = {Sophie Cerf and Sara Bouchenak and Bogdan Robu and Nicolas Marchand and Vincent Primault and Sonia Ben Mokhtar and Antoine Boutet and Lydia Y. Chen}, title = {Automatic Privacy and Utility Preservation for Mobility Data: {A} Nonlinear Model-Based Approach}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {269--282}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2884470}, doi = {10.1109/TDSC.2018.2884470}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/CerfBRMPMBC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenWHZCDA21, author = {Jing Chen and Chiheng Wang and Kun He and Ziming Zhao and Min Chen and Ruiying Du and Gail{-}Joon Ahn}, title = {Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {15--29}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2871682}, doi = {10.1109/TDSC.2018.2871682}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ChenWHZCDA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Cheng0S0021, author = {Xi Cheng and Min Zhou and Xiaoyu Song and Ming Gu and Jiaguang Sun}, title = {Automatic Integer Error Repair by Proper-Type Inference}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {918--935}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2913862}, doi = {10.1109/TDSC.2019.2913862}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/Cheng0S0021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChhetriBF0C021, author = {Sujit Rokka Chhetri and Anomadarshi Barua and Sina Faezi and Francesco Regazzoni and Arquimedes Canedo and Mohammad Abdullah Al Faruque}, title = {Tool of Spies: Leaking your {IP} by Altering the 3D Printer Compiler}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {667--678}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2923215}, doi = {10.1109/TDSC.2019.2923215}, timestamp = {Thu, 25 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ChhetriBF0C021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChizariL21, author = {Hassan Chizari and Emil Lupu}, title = {Extracting Randomness from the Trend of {IPI} for Cryptographic Operations in Implantable Medical Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {875--888}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2921773}, doi = {10.1109/TDSC.2019.2921773}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ChizariL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ConnellMA21, author = {Warren Connell and Daniel A. Menasc{\'{e}} and Massimiliano Albanese}, title = {Performance Modeling of Moving Target Defenses with Reconfiguration Limits}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {205--219}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2882825}, doi = {10.1109/TDSC.2018.2882825}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ConnellMA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DasKK21, author = {Rajkumar Das and Gour C. Karmakar and Joarder Kamruzzaman}, title = {How Much {I} Can Rely on You: Measuring Trustworthiness of a Twitter User}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {949--966}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2929782}, doi = {10.1109/TDSC.2019.2929782}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/DasKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DuZHQZCZ21, author = {Shaoyong Du and Pengxiong Zhu and Jingyu Hua and Zhiyun Qian and Zhao Zhang and Xiaoyu Chen and Sheng Zhong}, title = {An Empirical Analysis of Hazardous Uses of Android Shared Storage}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {340--355}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2889486}, doi = {10.1109/TDSC.2018.2889486}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/DuZHQZCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ElrabaaAA21, author = {Muhammad E. S. Elrabaa and Mohammed Alasli and Marwan H. Abu{-}Amara}, title = {Secure Computing Enclaves Using FPGAs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {593--604}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2933214}, doi = {10.1109/TDSC.2019.2933214}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ElrabaaAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GaoSGKPW21, author = {Xing Gao and Benjamin Steenkamer and Zhongshu Gu and Mehmet Kayaalp and Dimitrios Pendarakis and Haining Wang}, title = {A Study on the Security Implications of Information Leakages in Container Clouds}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {174--191}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2879605}, doi = {10.1109/TDSC.2018.2879605}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/GaoSGKPW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GeYZHLQH21, author = {Xinrui Ge and Jia Yu and Hanlin Zhang and Chengyu Hu and Zengpeng Li and Zhan Qin and Rong Hao}, title = {Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {490--504}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2896258}, doi = {10.1109/TDSC.2019.2896258}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/GeYZHLQH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuoZXAL21, author = {Hui Guo and Zhenfeng Zhang and Jing Xu and Ningyu An and Xiao Lan}, title = {Accountable Proxy Re-Encryption for Secure Data Sharing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {145--159}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2877601}, doi = {10.1109/TDSC.2018.2877601}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/GuoZXAL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Hu0W0ZYG21, author = {Xiaokang Hu and Jian Li and Changzheng Wei and Weigang Li and Xin Zeng and Ping Yu and Haibing Guan}, title = {{STYX:} {A} Hierarchical Key Management System for Elastic Content Delivery Networks on Public Clouds}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {843--857}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2918278}, doi = {10.1109/TDSC.2019.2918278}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/Hu0W0ZYG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HuHFW21, author = {Donghui Hu and Chunya Hu and Yuqi Fan and Xintao Wu}, title = {oGBAC - {A} Group Based Access Control Framework for Information Sharing in Online Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {100--116}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2875697}, doi = {10.1109/TDSC.2018.2875697}, timestamp = {Wed, 27 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/HuHFW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HuLYH21, author = {Qiao Hu and Yuanzhen Liu and Anjia Yang and Gerhard P. Hancke}, title = {Preventing Overshadowing Attacks in Self-Jamming Audio Channels}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {45--57}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2873767}, doi = {10.1109/TDSC.2018.2873767}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/HuLYH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JavaheripiSRJK21, author = {Mojan Javaheripi and Mohammad Samragh and Bita Darvish Rouhani and Tara Javidi and Farinaz Koushanfar}, title = {CuRTAIL: ChaRacterizing and Thwarting AdversarIal Deep Learning}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {736--752}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2020.3024191}, doi = {10.1109/TDSC.2020.3024191}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/JavaheripiSRJK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JinZ21, author = {Rong Jin and Kai Zeng}, title = {Manipulative Attack Against Physical Layer Key Agreement and Countermeasure}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {475--489}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2895325}, doi = {10.1109/TDSC.2019.2895325}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/JinZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KonczakWSZS21, author = {Jan Z. Konczak and Pawel T. Wojciechowski and Nuno Santos and Tomasz Zurkowski and Andr{\'{e}} Schiper}, title = {Recovery Algorithms for Paxos-Based State Machine Replication}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {623--640}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2926723}, doi = {10.1109/TDSC.2019.2926723}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/KonczakWSZS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LaiHJKCT21, author = {Yen{-}Lung Lai and Jung Yeon Hwang and Zhe Jin and Soohyong Kim and Sangrae Cho and Andrew Beng Jin Teoh}, title = {Secure Secret Sharing Enabled b-band Mini Vaults Bio-Cryptosystem for Vectorial Biometrics}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {58--71}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2874245}, doi = {10.1109/TDSC.2018.2874245}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LaiHJKCT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiHWLLDL21, author = {Jin Li and Yanyu Huang and Yu Wei and Siyi Lv and Zheli Liu and Changyu Dong and Wenjing Lou}, title = {Searchable Symmetric Encryption with Forward Search Privacy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {460--474}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2894411}, doi = {10.1109/TDSC.2019.2894411}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiHWLLDL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiYS0AL21, author = {Yannan Li and Guomin Yang and Willy Susilo and Yong Yu and Man Ho Au and Dongxi Liu}, title = {Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {679--691}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2910058}, doi = {10.1109/TDSC.2019.2910058}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiYS0AL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LianCCM21, author = {Bin Lian and Gongliang Chen and Jialin Cui and Maode Ma}, title = {Compact E-Cash with Efficient Coin-Tracing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {220--234}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2882507}, doi = {10.1109/TDSC.2018.2882507}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LianCCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiangLSLSW21, author = {Bin Liang and Hongcheng Li and Miaoqiang Su and Xirong Li and Wenchang Shi and Xiaofeng Wang}, title = {Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {72--85}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2874243}, doi = {10.1109/TDSC.2018.2874243}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiangLSLSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Liu00L21, author = {Guangchi Liu and Qing Yang and Honggang Wang and Alex X. Liu}, title = {Trust Assessment in Online Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {994--1007}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2916366}, doi = {10.1109/TDSC.2019.2916366}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/Liu00L21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuMXZH21, author = {Jianghua Liu and Jinhua Ma and Yang Xiang and Wanlei Zhou and Xinyi Huang}, title = {Authenticated Medical Documents Releasing with Privacy Protection and Release Control}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {448--459}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2892446}, doi = {10.1109/TDSC.2019.2892446}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiuMXZH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuZHC21, author = {Chang Liu and Liehuang Zhu and Xiangjian He and Jinjun Chen}, title = {Enabling Privacy-Preserving Shortest Distance Queries on Encrypted Graph Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {192--204}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2880981}, doi = {10.1109/TDSC.2018.2880981}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiuZHC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LuXSKL21, author = {Kangjie Lu and Meng Xu and Chengyu Song and Taesoo Kim and Wenke Lee}, title = {Stopping Memory Disclosures via Diversification and Replicated Execution}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {160--173}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2878234}, doi = {10.1109/TDSC.2018.2878234}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LuXSKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Luo0PYZZ21, author = {Chen Luo and Fei He and Fei Peng and Dong Yan and Dan Zhang and Xin Zhou}, title = {PSpec-SQL: Enabling Fine-Grained Control for Distributed Data Analytics}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {810--824}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2914209}, doi = {10.1109/TDSC.2019.2914209}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/Luo0PYZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Ma0H0X21, author = {Shunli Ma and Yi Deng and Debiao He and Jiang Zhang and Xiang Xie}, title = {An Efficient {NIZK} Scheme for Privacy-Preserving Transactions Over Account-Model Blockchain}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {641--651}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2020.2969418}, doi = {10.1109/TDSC.2020.2969418}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/Ma0H0X21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MoXLG21, author = {Yuchang Mo and Liudong Xing and Yi{-}Kuei Lin and Wenzhong Guo}, title = {Efficient Analysis of Repairable Computing Systems Subject to Scheduled Checkpointing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {1--14}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2869393}, doi = {10.1109/TDSC.2018.2869393}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/MoXLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MohantyZAR21, author = {Manoranjan Mohanty and Ming Zhang and Muhammad Rizwan Asghar and Giovanni Russello}, title = {e-PRNU: Encrypted Domain PRNU-Based Camera Attribution for Preserving Privacy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {426--437}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2892448}, doi = {10.1109/TDSC.2019.2892448}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/MohantyZAR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NeumeierK21, author = {Yaara Neumeier and Osnat Keren}, title = {Protecting Multi-Level Memories From Jamming Using Q-ary Expurgated Robust Codes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {936--948}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2021.3050088}, doi = {10.1109/TDSC.2021.3050088}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/NeumeierK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Pattaranantakul21, author = {Montida Pattaranantakul and Ruan He and Zonghua Zhang and Ahmed Meddahi and Ping Wang}, title = {Leveraging Network Functions Virtualization Orchestrators to Achieve Software-Defined Access Control in the Clouds}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {372--383}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2889709}, doi = {10.1109/TDSC.2018.2889709}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/Pattaranantakul21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PoudelM21, author = {Bikash Poudel and Arslan Munir}, title = {Design and Evaluation of a Reconfigurable {ECU} Architecture for Secure and Dependable Automotive {CPS}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {235--252}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2883057}, doi = {10.1109/TDSC.2018.2883057}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/PoudelM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/QiZ21, author = {Saiyu Qi and Yuanqing Zheng}, title = {Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {765--779}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2908164}, doi = {10.1109/TDSC.2019.2908164}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/QiZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Rrushi21, author = {Julian L. Rrushi}, title = {{DNIC} Architectural Developments for 0-Knowledge Detection of {OPC} Malware}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {30--44}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2872536}, doi = {10.1109/TDSC.2018.2872536}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/Rrushi21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShuYJLWD21, author = {Jiangang Shu and Kan Yang and Xiaohua Jia and Ximeng Liu and Cong Wang and Robert H. Deng}, title = {Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {117--130}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2875682}, doi = {10.1109/TDSC.2018.2875682}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ShuYJLWD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SiddiqiAS21, author = {Muhammad Siddiqi and Syed Taha Ali and Vijay Sivaraman}, title = {Secure Opportunistic Contextual Logging for Wearable Healthcare Sensing Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {753--764}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2927674}, doi = {10.1109/TDSC.2019.2927674}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/SiddiqiAS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SinghCF21, author = {Bikash Chandra Singh and Barbara Carminati and Elena Ferrari}, title = {Privacy-Aware Personal Data Storage {(P-PDS):} Learning how to Protect User Privacy from External Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {889--903}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2903802}, doi = {10.1109/TDSC.2019.2903802}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SinghCF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SunQ21, author = {Guosong Sun and Quan Qian}, title = {Deep Learning and Visualization for Identifying Malware Families}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {283--295}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2884928}, doi = {10.1109/TDSC.2018.2884928}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/SunQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Tang0SCS21, author = {Peng Tang and Xiang Cheng and Sen Su and Rui Chen and Huaxi Shao}, title = {Differentially Private Publication of Vertically Partitioned Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {780--795}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2905237}, doi = {10.1109/TDSC.2019.2905237}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/Tang0SCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangY00M21, author = {Leye Wang and Dingqi Yang and Xiao Han and Daqing Zhang and Xiaojuan Ma}, title = {Mobile Crowdsourcing Task Allocation with Differential-and-Distortion Geo-Obfuscation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {967--981}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2912886}, doi = {10.1109/TDSC.2019.2912886}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/WangY00M21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangZZLGFP21, author = {Jingyi Wang and Xinyue Zhang and Qixun Zhang and Ming Li and Yuanxiong Guo and Zhiyong Feng and Miao Pan}, title = {Data-Driven Spectrum Trading with Secondary Users' Differential Privacy Preservation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {438--447}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2892447}, doi = {10.1109/TDSC.2019.2892447}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/WangZZLGFP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WuY0GD21, author = {Tong Wu and Guomin Yang and Yi Mu and Fuchun Guo and Robert H. Deng}, title = {Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {563--575}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2931193}, doi = {10.1109/TDSC.2019.2931193}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/WuY0GD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XieCM21, author = {Ning Xie and Changsheng Chen and Zhong Ming}, title = {Security Model of Authentication at the Physical Layer and Performance Analysis over Fading Channels}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {253--268}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2883598}, doi = {10.1109/TDSC.2018.2883598}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/XieCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuJK21, author = {Runhua Xu and James Joshi and Prashant Krishnamurthy}, title = {An Integrated Privacy Preserving Attribute-Based Access Control Framework Supporting Secure Deduplication}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {706--721}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2946073}, doi = {10.1109/TDSC.2019.2946073}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/XuJK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YaoC0LW21, author = {Lin Yao and Zhenyu Chen and Xin Wang and Dong Liu and Guowei Wu}, title = {Sensitive Label Privacy Preservation with Anatomization for Data Publishing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {904--917}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2919833}, doi = {10.1109/TDSC.2019.2919833}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/YaoC0LW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangWJS21, author = {Mengyuan Zhang and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, title = {Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience Against Zero-Day Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {310--324}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2889086}, doi = {10.1109/TDSC.2018.2889086}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangWJS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhengWH21, author = {Shuli Zheng and Yuzhao Wang and Donghui Hu}, title = {Lossless Data Hiding Based on Homomorphic Cryptosystem}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {692--705}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2913422}, doi = {10.1109/TDSC.2019.2913422}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ZhengWH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhuAV21, author = {Xiaojie Zhu and Erman Ayday and Roman Vitenberg}, title = {A Privacy-Preserving Framework for Outsourcing Location-Based Services to the Cloud}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {384--399}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2892150}, doi = {10.1109/TDSC.2019.2892150}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ZhuAV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhuRGGB21, author = {Ye Zhu and Nicholas Ruffing and Jonathan Gurary and Yong Guan and Riccardo Bettati}, title = {Towards Smartphone Operating System Identification}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {411--425}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2892482}, doi = {10.1109/TDSC.2019.2892482}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ZhuRGGB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZoppiCB21, author = {Tommaso Zoppi and Andrea Ceccarelli and Andrea Bondavalli}, title = {MADneSs: {A} Multi-Layer Anomaly Detection Framework for Complex Dynamic Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {796--809}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2908366}, doi = {10.1109/TDSC.2019.2908366}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ZoppiCB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0001TWQ20, author = {Zheng Zheng and Kishor S. Trivedi and Nan Wang and Kun Qiu}, title = {Markov Regenerative Models of WebServers for Their User-Perceived Availability and Bottlenecks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {92--105}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2753803}, doi = {10.1109/TDSC.2017.2753803}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/0001TWQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0004ZFGZZ20, author = {Yuan Zhang and Boyu Zhu and Yixin Fang and Suxin Guo and Aidong Zhang and Sheng Zhong}, title = {Secure Inter-Domain Forwarding Loop Test in Software Defined Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {162--178}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2731773}, doi = {10.1109/TDSC.2017.2731773}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/0004ZFGZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0026LDL20, author = {Yang Yang and Ximeng Liu and Robert H. Deng and Yingjiu Li}, title = {Lightweight Sharable and Traceable Secure Mobile Health System}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {78--91}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2729556}, doi = {10.1109/TDSC.2017.2729556}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/0026LDL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AbrathCMBS20, author = {Bert Abrath and Bart Coppens and Mohit Mishra and Jens Van den Broeck and Bjorn De Sutter}, title = {{\textdollar}{\textbackslash}Delta{\textdollar}{\(\Delta\)}Breakpad: Diversified Binary Crash Reporting}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {841--856}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2823751}, doi = {10.1109/TDSC.2018.2823751}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AbrathCMBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AizpuruaPM20, author = {Jose Ignacio Aizpurua and Yiannis Papadopoulos and Guillaume Merle}, title = {Explicit Modelling and Treatment of Repair in Prediction of Dependability}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1147--1162}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2857810}, doi = {10.1109/TDSC.2018.2857810}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/AizpuruaPM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BehniaOY20, author = {Rouzbeh Behnia and Muslum Ozgur Ozmen and Attila Altay Yavuz}, title = {Lattice-Based Public Key Searchable Encryption from Experimental Perspectives}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1269--1282}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2867462}, doi = {10.1109/TDSC.2018.2867462}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/BehniaOY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BergeCGW20, author = {Pierre Berg{\'{e}} and Jason Crampton and Gregory Z. Gutin and R{\'{e}}mi Watrigant}, title = {The Authorization Policy Existence Problem}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1333--1344}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2883416}, doi = {10.1109/TDSC.2018.2883416}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/BergeCGW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CatuognoGP20, author = {Luigi Catuogno and Clemente Galdi and Giuseppe Persiano}, title = {Secure Dependency Enforcement in Package Management Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {377--390}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2777991}, doi = {10.1109/TDSC.2017.2777991}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CatuognoGP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChakrabortyPS20, author = {Tanmoy Chakraborty and Fabio Pierazzi and V. S. Subrahmanian}, title = {{EC2:} Ensemble Clustering and Classification for Predicting Android Malware Families}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {262--277}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2739145}, doi = {10.1109/TDSC.2017.2739145}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ChakrabortyPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenHCP20, author = {Jiayi Chen and Jianping He and Lin Cai and Jianping Pan}, title = {Disclose More and Risk Less: Privacy Preserving Online Social Network Data Sharing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1173--1187}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2861403}, doi = {10.1109/TDSC.2018.2861403}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChenHCP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CleemputSB20, author = {Jeroen Van Cleemput and Bjorn De Sutter and Koen De Bosschere}, title = {Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {35--49}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2729549}, doi = {10.1109/TDSC.2017.2729549}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CleemputSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DingYD20, author = {Wenxiu Ding and Zheng Yan and Robert H. Deng}, title = {Privacy-Preserving Data Processing with Flexible Access Control}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {363--376}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2786247}, doi = {10.1109/TDSC.2017.2786247}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DingYD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DongWMPGG20, author = {Boxiang Dong and Hui Wang and Anna Monreale and Dino Pedreschi and Fosca Giannotti and Wenge Guo}, title = {Authenticated Outlier Mining for Outsourced Databases}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {222--235}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2754493}, doi = {10.1109/TDSC.2017.2754493}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DongWMPGG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/EmuraHI20, author = {Keita Emura and Takuya Hayashi and Ai Ishida}, title = {Group Signatures with Time-Bound Keys Revisited: {A} New Model, an Efficient Construction, and its Implementation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {292--305}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2754247}, doi = {10.1109/TDSC.2017.2754247}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/EmuraHI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ErrapotuLYRPPH20, author = {Sai Mounika Errapotu and Hongning Li and Rong Yu and Shaolei Ren and Qingqi Pei and Miao Pan and Zhu Han}, title = {Clock Auction Inspired Privacy Preserving Emergency Demand Response in Colocation Data Centers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {691--702}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2875732}, doi = {10.1109/TDSC.2018.2875732}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ErrapotuLYRPPH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/EspositoFCPS20, author = {Christian Esposito and Massimo Ficco and Aniello Castiglione and Francesco Palmieri and Alfredo De Santis}, title = {Distributed Group Key Management for Event Notification Confidentiality Among Sensors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {566--580}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2799227}, doi = {10.1109/TDSC.2018.2799227}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/EspositoFCPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FengYZC20, author = {Jun Feng and Laurence T. Yang and Qing Zhu and Kim{-}Kwang Raymond Choo}, title = {Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {857--868}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2881452}, doi = {10.1109/TDSC.2018.2881452}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FengYZC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GovindarajGK20, author = {Rekha Govindaraj and Swaroop Ghosh and Srinivas Katkoori}, title = {Design, Analysis and Application of Embedded Resistive {RAM} Based Strong Arbiter {PUF}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1232--1242}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2866425}, doi = {10.1109/TDSC.2018.2866425}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/GovindarajGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HanCCLFXW20, author = {Weili Han and Chang Cao and Hao Chen and Dong Li and Zheran Fang and Wenyuan Xu and X. Sean Wang}, title = {senDroid: Auditing Sensor Access in Android System-Wide}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {407--421}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2768536}, doi = {10.1109/TDSC.2017.2768536}, timestamp = {Fri, 26 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HanCCLFXW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HeGWWLY20, author = {Kai He and Jun Guo and Jian Weng and Jia{-}Si Weng and Joseph K. Liu and Xun Yi}, title = {Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1207--1217}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2864186}, doi = {10.1109/TDSC.2018.2864186}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HeGWWLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HolgadoVV20, author = {Pilar Holgado and V{\'{\i}}ctor A. Villagr{\'{a}} and Luis V{\'{a}}zquez}, title = {Real-Time Multistep Attack Prediction Based on Hidden Markov Models}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {134--147}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2751478}, doi = {10.1109/TDSC.2017.2751478}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HolgadoVV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HuangSKKN20, author = {Chin{-}Tser Huang and Muhammad N. Sakib and Charles A. Kamhoua and Kevin A. Kwiat and Laurent Njilla}, title = {A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1257--1268}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2866821}, doi = {10.1109/TDSC.2018.2866821}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/HuangSKKN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HuangZPX20, author = {Yonggang Huang and Jun Zhang and Lei Pan and Yang Xiang}, title = {Privacy Protection in Interactive Content Based Image Retrieval}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {595--607}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2793923}, doi = {10.1109/TDSC.2018.2793923}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HuangZPX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/InanGS20, author = {Ali Inan and Mehmet Emre Gursoy and Y{\"{u}}cel Saygin}, title = {Sensitivity Analysis for Non-Interactive Differential Privacy: Bounds and Efficient Algorithms}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {194--207}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2734664}, doi = {10.1109/TDSC.2017.2734664}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/InanGS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ItkinW20, author = {Eyal Itkin and Avishai Wool}, title = {A Security Analysis and Revised Security Extension for the Precision Time Protocol}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {22--34}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2748583}, doi = {10.1109/TDSC.2017.2748583}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ItkinW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JiangXWLW20, author = {Linzhi Jiang and Chunxiang Xu and Xiaofang Wang and Bo Luo and Huaqun Wang}, title = {Secure outsourcing {SIFT:} Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {179--193}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2751476}, doi = {10.1109/TDSC.2017.2751476}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JiangXWLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JohnHOD20, author = {Tara Merin John and Syed Kamran Haider and Hamza Omar and Marten van Dijk}, title = {Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {436--442}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2779780}, doi = {10.1109/TDSC.2017.2779780}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JohnHOD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JumaSBT20, author = {Nahid Juma and Jonathan Shahen and Khalid Zaman Bijon and Mahesh Tripunitara}, title = {The Overhead from Combating Side-Channels in Cloud Systems Using VM-Scheduling}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {422--435}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2790932}, doi = {10.1109/TDSC.2018.2790932}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JumaSBT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KaitovicM20, author = {Igor Kaitovic and Miroslaw Malek}, title = {Impact of Failure Prediction on Availability: Modeling and Comparative Analysis of Predictive and Reactive Methods}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {493--505}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2806448}, doi = {10.1109/TDSC.2018.2806448}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KaitovicM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KaplanGNS20, author = {Emre Kaplan and Mehmet Emre Gursoy and Mehmet Ercan Nergiz and Y{\"{u}}cel Saygin}, title = {Known Sample Attacks on Relation Preserving Data Transformations}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {443--450}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2759732}, doi = {10.1109/TDSC.2017.2759732}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KaplanGNS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KhasawnehODAP20, author = {Khaled N. Khasawneh and Meltem Ozsoy and Caleb Donovick and Nael B. Abu{-}Ghazaleh and Dmitry Ponomarev}, title = {EnsembleHMD: Accurate Hardware Malware Detectors with Specialized Ensemble Classifiers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {620--633}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2801858}, doi = {10.1109/TDSC.2018.2801858}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KhasawnehODAP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KlempererJPH20, author = {Peter F. Klemperer and Hye Yoon Jeon and Bryan D. Payne and James C. Hoe}, title = {High-Performance Memory Snapshotting for Real-Time, Consistent, Hypervisor-Based Monitors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {518--535}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2805904}, doi = {10.1109/TDSC.2018.2805904}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KlempererJPH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiCZMWS20, author = {Huaxin Li and Qingrong Chen and Haojin Zhu and Di Ma and Hong Wen and Xuemin Sherman Shen}, title = {Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {350--362}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2754249}, doi = {10.1109/TDSC.2017.2754249}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiCZMWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiLSWLL20, author = {Jing Li and Peng Li and Rebecca J. Stones and Gang Wang and Zhongwei Li and Xiaoguang Liu}, title = {Reliability Equations for Cloud Storage Systems with Proactive Fault Tolerance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {782--794}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2882512}, doi = {10.1109/TDSC.2018.2882512}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiLSWLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiZQFR20, author = {Sheng Li and Xinpeng Zhang and Zhenxing Qian and Guorui Feng and Yanli Ren}, title = {Key Based Artificial Fingerprint Generation for Privacy Protection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {828--840}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2812192}, doi = {10.1109/TDSC.2018.2812192}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiZQFR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiangPK20, author = {Xiaohui Liang and Ronald A. Peterson and David Kotz}, title = {Securely Connecting Wearables to Ambient Displays with User Intent}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {676--690}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2840979}, doi = {10.1109/TDSC.2018.2840979}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiangPK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuLPRS20, author = {Zhe Liu and Patrick Longa and Geovandro C. C. F. Pereira and Oscar Reparaz and Hwajeong Seo}, title = {Four{\textdollar}{\textbackslash}mathbb \{Q\}{\textdollar}Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {536--549}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2799844}, doi = {10.1109/TDSC.2018.2799844}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuLPRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuLZL20, author = {Zishan Liu and Zhenyu Liu and Lin Zhang and Xiaodong Lin}, title = {{MARP:} {A} Distributed {MAC} Layer Attack Resistant Pseudonym Scheme for {VANET}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {869--882}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2838136}, doi = {10.1109/TDSC.2018.2838136}, timestamp = {Mon, 10 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuLZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuYMD20, author = {Xueqiao Liu and Guomin Yang and Yi Mu and Robert H. Deng}, title = {Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1322--1332}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2876831}, doi = {10.1109/TDSC.2018.2876831}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiuYMD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LuLHL20, author = {Li Lu and Lingshuang Liu and Muhammad Jawad Hussain and Yongshuai Liu}, title = {I Sense You by Breath: Speaker Recognition via Breath Biometrics}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {306--319}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2767587}, doi = {10.1109/TDSC.2017.2767587}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LuLHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaAZLXLMG20, author = {Xiaobo Ma and Bo An and Mengchen Zhao and Xiapu Luo and Lei Xue and Zhenhua Li and Tony T. N. Miu and Xiaohong Guan}, title = {Randomized Security Patrolling for Link Flooding Attack Detection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {795--812}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2019.2892370}, doi = {10.1109/TDSC.2019.2892370}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MaAZLXLMG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaruseacG20, author = {Mihai Maruseac and Gabriel Ghinita}, title = {Precision-Enhanced Differentially-Private Mining of High-Confidence Association Rules}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1297--1309}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2868190}, doi = {10.1109/TDSC.2018.2868190}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/MaruseacG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MohaisenGRLKNN20, author = {Aziz Mohaisen and Zhongshu Gu and Kui Ren and Zhenhua Li and Charles A. Kamhoua and Laurent L. Njilla and DaeHun Nyang}, title = {Look-Aside at Your Own Risk: Privacy Implications of {DNSSEC} Look-Aside Validation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {745--759}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2816026}, doi = {10.1109/TDSC.2018.2816026}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MohaisenGRLKNN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MontieriCAP20, author = {Antonio Montieri and Domenico Ciuonzo and Giuseppe Aceto and Antonio Pescap{\`{e}}}, title = {Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web)}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {662--675}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2804394}, doi = {10.1109/TDSC.2018.2804394}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MontieriCAP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MunirK20, author = {Arslan Munir and Farinaz Koushanfar}, title = {Design and Analysis of Secure and Dependable Automotive {CPS:} {A} Steer-by-Wire Case Study}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {813--827}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2846741}, doi = {10.1109/TDSC.2018.2846741}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MunirK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NaroueiTN20, author = {Masoud Narouei and Hassan Takabi and Rodney Nielsen}, title = {Automatic Extraction of Access Control Policies from Natural Language Documents}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {506--517}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2818708}, doi = {10.1109/TDSC.2018.2818708}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/NaroueiTN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NiZYLS20, author = {Jianbing Ni and Kuan Zhang and Yong Yu and Xiaodong Lin and Xuemin Sherman Shen}, title = {Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {581--594}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2791432}, doi = {10.1109/TDSC.2018.2791432}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/NiZYLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PanH0G0TC20, author = {Yanjun Pan and Yantian Hou and Ming Li and Ryan M. Gerdes and Kai Zeng and Md. Asaduzzaman Towfiq and Bedri A. Cetiner}, title = {Message Integrity Protection Over Wireless Channel: Countering Signal Cancellation via Channel Randomization}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {106--120}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2751600}, doi = {10.1109/TDSC.2017.2751600}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PanH0G0TC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ParkKRWHX20, author = {Sungjin Park and Chung Hwan Kim and Junghwan Rhee and Jong{-}Jin Won and Taisook Han and Dongyan Xu}, title = {{CAFE:} {A} Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {883--897}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2817545}, doi = {10.1109/TDSC.2018.2817545}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ParkKRWHX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RahmanD20, author = {Mohammad Ashiqur Rahman and Amarjit Datta}, title = {Impact of Stealthy Attacks on Optimal Power Flow: {A} Simulink-Driven Formal Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {451--464}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2806969}, doi = {10.1109/TDSC.2018.2806969}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RahmanD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RajkumarS20, author = {P. V. Rajkumar and Ravi S. Sandhu}, title = {Safety Decidability for Pre-Authorization Usage Control with Identifier Attribute Domains}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {465--478}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2839745}, doi = {10.1109/TDSC.2018.2839745}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/RajkumarS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SalvePMR20, author = {Andrea De Salve and Roberto Di Pietro and Paolo Mori and Laura Ricci}, title = {A Logical Key Hierarchy Based Approach to Preserve Content Privacy in Decentralized Online Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {2--21}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2729553}, doi = {10.1109/TDSC.2017.2729553}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SalvePMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SatyalWB020, author = {Suhrid Satyal and Ingo Weber and Len Bass and Min Fu}, title = {Rollback Mechanisms for Cloud Management APIs Using {AI} Planning}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {148--161}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2729543}, doi = {10.1109/TDSC.2017.2729543}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SatyalWB020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SaxenaSKCC20, author = {Neetesh Saxena and Hong Shen and Nikos Komninos and Kim{-}Kwang Raymond Choo and Narendra S. Chaudhari}, title = {{BVPSMS:} {A} Batch Verification Protocol for End-to-End Secure {SMS} for Mobile Users}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {550--565}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2799223}, doi = {10.1109/TDSC.2018.2799223}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SaxenaSKCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShahzadSL20, author = {Muhammad Shahzad and M. Zubair Shafiq and Alex X. Liu}, title = {Large Scale Characterization of Software Vulnerability Life Cycles}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {730--744}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2019.2893950}, doi = {10.1109/TDSC.2019.2893950}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ShahzadSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShenCGM20, author = {Chao Shen and Yufei Chen and Xiaohong Guan and Roy A. Maxion}, title = {Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication System}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {335--349}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2771295}, doi = {10.1109/TDSC.2017.2771295}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShenCGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShenLSG20, author = {Zhirong Shen and Patrick P. C. Lee and Jiwu Shu and Wenzhong Guo}, title = {Cross-Rack-Aware Single Failure Recovery for Clustered File Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {248--261}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2774299}, doi = {10.1109/TDSC.2017.2774299}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShenLSG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SrinivasDWK20, author = {Jangirala Srinivas and Ashok Kumar Das and Mohammad Wazid and Neeraj Kumar}, title = {Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1133--1146}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2857811}, doi = {10.1109/TDSC.2018.2857811}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/SrinivasDWK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TianYRTP20, author = {Ke Tian and Danfeng Yao and Barbara G. Ryder and Gang Tan and Guojun Peng}, title = {Detection of Repackaged Android Malware with Code-Heterogeneity Features}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {64--77}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2745575}, doi = {10.1109/TDSC.2017.2745575}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TianYRTP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Vaidya20, author = {Jaideep Vaidya}, title = {Editorial}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {1}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2019.2958396}, doi = {10.1109/TDSC.2019.2958396}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Vaidya20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ViscontiG20, author = {Andrea Visconti and Federico Gorla}, title = {Exploiting an {HMAC-SHA-1} Optimization to Speed up {PBKDF2}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {775--781}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2878697}, doi = {10.1109/TDSC.2018.2878697}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ViscontiG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WalzS20, author = {Andreas Walz and Axel Sikora}, title = {Exploiting Dissent: Towards Fuzzing-Based Differential Black-Box Testing of {TLS} Implementations}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {278--291}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2763947}, doi = {10.1109/TDSC.2017.2763947}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WalzS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangCCM20, author = {An Wang and Wentao Chang and Songqing Chen and Aziz Mohaisen}, title = {A Data-Driven Study of DDoS Attacks and Their Dynamics}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {648--661}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2808344}, doi = {10.1109/TDSC.2018.2808344}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangCCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WazidDOKS20, author = {Mohammad Wazid and Ashok Kumar Das and Vanga Odelu and Neeraj Kumar and Willy Susilo}, title = {Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {391--406}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2764083}, doi = {10.1109/TDSC.2017.2764083}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WazidDOKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XieFHLSL20, author = {Yulai Xie and Dan Feng and Yuchong Hu and Yan Li and Staunton Sample and Darrell D. E. Long}, title = {Pagoda: {A} Hybrid Approach to Enable Efficient Real-Time Provenance Based Intrusion Detection in Big Data Environments}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1283--1296}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2867595}, doi = {10.1109/TDSC.2018.2867595}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/XieFHLSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuTCW20, author = {Wenyuan Xu and Jing Tian and Yu Cao and Song Wang}, title = {Challenge-Response Authentication Using In-Air Handwriting Style Verification}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {51--64}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2752164}, doi = {10.1109/TDSC.2017.2752164}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuTCW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuZZL20, author = {Hui Xu and Zirui Zhao and Yangfan Zhou and Michael R. Lyu}, title = {Benchmarking the Capability of Symbolic Execution Tools with Logic Bombs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1243--1256}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2866469}, doi = {10.1109/TDSC.2018.2866469}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/XuZZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YangLD20, author = {Yang Yang and Ximeng Liu and Robert H. Deng}, title = {Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary Language}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {320--334}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2787588}, doi = {10.1109/TDSC.2017.2787588}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YangLD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YangLYT20, author = {Lu{-}Xing Yang and Pengdeng Li and Xiaofan Yang and Yuan Yan Tang}, title = {A Risk Management Approach to Defending Against the Advanced Persistent Threat}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1163--1172}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2858786}, doi = {10.1109/TDSC.2018.2858786}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/YangLYT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YaoFDFW20, author = {Lin Yao and Zhenzhen Fan and Jing Deng and Xin Fan and Guowei Wu}, title = {Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1310--1321}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2876257}, doi = {10.1109/TDSC.2018.2876257}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/YaoFDFW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YouLSWZ20, author = {Wei You and Bin Liang and Wenchang Shi and Peng Wang and Xiangyu Zhang}, title = {TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {209--222}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2740169}, doi = {10.1109/TDSC.2017.2740169}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YouLSWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangL20, author = {Yan Zhang and Loukas Lazos}, title = {Misbehavior in Multi-Channel {MAC} Protocols}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {760--774}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2819170}, doi = {10.1109/TDSC.2018.2819170}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangMCZD20, author = {Lei Zhang and Xinyu Meng and Kim{-}Kwang Raymond Choo and Yuanfei Zhang and Feifei Dai}, title = {Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {634--647}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2797190}, doi = {10.1109/TDSC.2018.2797190}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangMCZD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangYHWR20, author = {Yue Zhang and Jia Yu and Rong Hao and Cong Wang and Kui Ren}, title = {Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {608--619}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2829880}, doi = {10.1109/TDSC.2018.2829880}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangYHWR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangZHC20, author = {Zhikun Zhang and Heng Zhang and Shibo He and Peng Cheng}, title = {Bilateral Privacy-Preserving Utility Maximization Protocol in Database-Driven Cognitive Radio Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {236--247}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2781248}, doi = {10.1109/TDSC.2017.2781248}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangZHC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangZWWSR20, author = {Leo Yu Zhang and Yifeng Zheng and Jian Weng and Cong Wang and Zihao Shan and Kui Ren}, title = {You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1218--1231}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2864748}, doi = {10.1109/TDSC.2018.2864748}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangZWWSR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhaoC20, author = {Liang Zhao and Liqun Chen}, title = {Sparse Matrix Masking-Based Non-Interactive Verifiable (Outsourced) Computation, Revisited}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1188--1206}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2861699}, doi = {10.1109/TDSC.2018.2861699}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ZhaoC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhaoKKKN20, author = {Hong Zhao and Luke Kwiat and Kevin A. Kwiat and Charles A. Kamhoua and Laurent Njilla}, title = {Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {716--729}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2864733}, doi = {10.1109/TDSC.2018.2864733}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhaoKKKN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhengDY020, author = {Yifeng Zheng and Huayi Duan and Xingliang Yuan and Cong Wang}, title = {Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {121--133}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2753245}, doi = {10.1109/TDSC.2017.2753245}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhengDY020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhuLZM20, author = {Xiaonan Zhu and Jinku Li and Yajin Zhou and Jianfeng Ma}, title = {AdCapsule: Practical Confinement of Advertisements in Android Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {479--492}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2814999}, doi = {10.1109/TDSC.2018.2814999}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhuLZM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhuLZQ20, author = {Liehuang Zhu and Meng Li and Zijian Zhang and Zhan Qin}, title = {{ASAP:} An Anonymous Smart-Parking and Payment Scheme in Vehicular Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {703--715}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2850780}, doi = {10.1109/TDSC.2018.2850780}, timestamp = {Wed, 19 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhuLZQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0010MSZ19, author = {Song Gao and Manar Mohamed and Nitesh Saxena and Chengcui Zhang}, title = {Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {6}, pages = {1040--1053}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2719031}, doi = {10.1109/TDSC.2017.2719031}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/0010MSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AbadiTMD19, author = {Aydin Abadi and Sotirios Terzis and Roberto Metere and Changyu Dong}, title = {Efficient Delegated Private Set Intersection on Outsourced Private Datasets}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {4}, pages = {608--624}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2708710}, doi = {10.1109/TDSC.2017.2708710}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AbadiTMD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AbderrahimC19, author = {Wiem Abderrahim and Zi{\`{e}}d Choukair}, title = {Dependability Integration in Cloud-hosted Telecommunication Services}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {6}, pages = {957--968}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2875088}, doi = {10.1109/TDSC.2018.2875088}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AbderrahimC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AcsCGGTW19, author = {Gergely {\'{A}}cs and Mauro Conti and Paolo Gasti and Cesar Ghali and Gene Tsudik and Christopher A. Wood}, title = {Privacy-Aware Caching in Information-Centric Networking}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {2}, pages = {313--328}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2679711}, doi = {10.1109/TDSC.2017.2679711}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AcsCGGTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AhnGHS19, author = {Gail{-}Joon Ahn and Guofei Gu and Hongxin Hu and Seungwon Shin}, title = {Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {6}, pages = {913--914}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2019.2906921}, doi = {10.1109/TDSC.2019.2906921}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AhnGHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AmmarCJHD19, author = {Mahmoud Ammar and Bruno Crispo and Bart Jacobs and Danny Hughes and Wilfried Daniels}, title = {S{\(\mu\)}V - The Security MicroVisor: {A} Formally-Verified Software-Based Security Architecture for the Internet of Things}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {5}, pages = {885--901}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2019.2928541}, doi = {10.1109/TDSC.2019.2928541}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AmmarCJHD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AnandS19, author = {S. Abhishek Anand and Nitesh Saxena}, title = {Noisy Vibrational Pairing of IoT Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {3}, pages = {530--545}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2873372}, doi = {10.1109/TDSC.2018.2873372}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AnandS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ArshadFPGA19, author = {Muhammad Umer Arshad and Muhamad Felemban and Zahid Pervaiz and Arif Ghafoor and Walid G. Aref}, title = {A Privacy Mechanism for Access Controlled Graph Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {5}, pages = {819--832}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2714660}, doi = {10.1109/TDSC.2017.2714660}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ArshadFPGA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AydayTY19, author = {Erman Ayday and Qiang Tang and Arif Yilmaz}, title = {Cryptographic Solutions for Credibility and Liability Issues of Genomic Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {1}, pages = {33--43}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2690422}, doi = {10.1109/TDSC.2017.2690422}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AydayTY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BaoS19, author = {Chongxi Bao and Ankur Srivastava}, title = {Reducing Timing Side-Channel Information Leakage Using 3D Integration}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {4}, pages = {665--678}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2712156}, doi = {10.1109/TDSC.2017.2712156}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BaoS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BaracaldoPJ19, author = {Nathalie Baracaldo and Balaji Palanisamy and James Joshi}, title = {{G-SIR:} An Insider Attack Resilient Geo-Social Access Control Framework}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {1}, pages = {84--98}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2654438}, doi = {10.1109/TDSC.2017.2654438}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BaracaldoPJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Becker19, author = {Georg T. Becker}, title = {Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory versus Practice}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {5}, pages = {783--795}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2762675}, doi = {10.1109/TDSC.2017.2762675}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Becker19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CalderS19, author = {Muffy Calder and Michele Sevegnani}, title = {Stochastic Model Checking for Predicting Component Failures and Service Availability}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {1}, pages = {174--187}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2650901}, doi = {10.1109/TDSC.2017.2650901}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CalderS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CaoWZ19, author = {Zhenfu Cao and Hongbing Wang and Yunlei Zhao}, title = {{AP-PRE:} Autonomous Path Proxy Re-Encryption and Its Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {5}, pages = {833--842}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2714166}, doi = {10.1109/TDSC.2017.2714166}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CaoWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChangDRT19, author = {Chip{-}Hong Chang and Marten van Dijk and Ulrich R{\"{u}}hrmair and Mark Mohammad Tehranipoor}, title = {Emerging Attacks and Solutions for Secure Hardware in the Internet of Things}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {3}, pages = {373--375}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2019.2901048}, doi = {10.1109/TDSC.2019.2901048}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChangDRT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChangGMS19, author = {Akshima and Donghoon Chang and Aarushi Goel and Sweta Mishra and Somitra Kumar Sanadhya}, title = {Generation of Secure and Reliable Honeywords, Preventing False Detection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {5}, pages = {757--769}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2824323}, doi = {10.1109/TDSC.2018.2824323}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChangGMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChaseNWCK19, author = {Jonathan Chase and Dusit Niyato and Ping Wang and Sivadon Chaisiri and Ryan K. L. Ko}, title = {A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {4}, pages = {565--579}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2703626}, doi = {10.1109/TDSC.2017.2703626}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChaseNWCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChatterjeeGSMCM19, author = {Urbi Chatterjee and Vidya Govindan and Rajat Sadhukhan and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty and Debashis Mahata and Mukesh M. Prabhu}, title = {Building {PUF} Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {3}, pages = {424--437}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2832201}, doi = {10.1109/TDSC.2018.2832201}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChatterjeeGSMCM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenSLQZ19, author = {Qingjun Chen and Shouqian Shi and Xin Li and Chen Qian and Sheng Zhong}, title = {SDN-Based Privacy Preserving Cross Domain Routing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {6}, pages = {930--943}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2811807}, doi = {10.1109/TDSC.2018.2811807}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChenSLQZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CockDHKNPT19, author = {Martine De Cock and Rafael Dowsley and Caleb Horst and Raj S. Katti and Anderson C. A. Nascimento and Wing{-}Sea Poon and Stacey Truex}, title = {Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {2}, pages = {217--230}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2679189}, doi = {10.1109/TDSC.2017.2679189}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CockDHKNPT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CotaMGDLMB19, author = {Guido Lena Cota and Sonia Ben Mokhtar and Gabriele Gianini and Ernesto Damiani and Julia Lawall and Gilles Muller and Lionel Brunie}, title = {{RACOON++:} {A} Semi-Automatic Framework for the Selfishness-Aware Design of Cooperative Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {4}, pages = {635--650}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2706286}, doi = {10.1109/TDSC.2017.2706286}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CotaMGDLMB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CotroneoPP19, author = {Domenico Cotroneo and Andrea Paudice and Antonio Pecchia}, title = {Empirical Analysis and Validation of Security Alerts Filtering Techniques}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {5}, pages = {856--870}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2714164}, doi = {10.1109/TDSC.2017.2714164}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CotroneoPP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DemontisMBMARCG19, author = {Ambra Demontis and Marco Melis and Battista Biggio and Davide Maiorca and Daniel Arp and Konrad Rieck and Igino Corona and Giorgio Giacinto and Fabio Roli}, title = {Yes, Machine Learning Can Be More Secure! {A} Case Study on Android Malware Detection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {4}, pages = {711--724}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2700270}, doi = {10.1109/TDSC.2017.2700270}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DemontisMBMARCG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DingLJ19, author = {Xiaofeng Ding and Peng Liu and Hai Jin}, title = {Privacy-Preserving Multi-Keyword Top-{\textdollar}k{\textdollar} k Similarity Search Over Encrypted Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {2}, pages = {344--357}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2693969}, doi = {10.1109/TDSC.2017.2693969}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/DingLJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FarbehMZM19, author = {Hamed Farbeh and Fereshte Mozafari and Masoume Zabihi and Seyed Ghassem Miremadi}, title = {RAW-Tag: Replicating in Altered Cache Ways for Correcting Multiple-Bit Errors in Tag Array}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {4}, pages = {651--664}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2706263}, doi = {10.1109/TDSC.2017.2706263}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FarbehMZM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FuLYYYZ19, author = {Cai Fu and Xiao{-}Yang Liu and Jia Yang and Laurence T. Yang and Shui Yu and Tianqing Zhu}, title = {Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {4}, pages = {693--710}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2703887}, doi = {10.1109/TDSC.2017.2703887}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FuLYYYZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FyrbiakWSHHWWTP19, author = {Marc Fyrbiak and Sebastian Wallat and Pawel Swierczynski and Max Hoffmann and Sebastian Hoppach and Matthias Wilhelm and Tobias Weidlich and Russell Tessier and Christof Paar}, title = {{HAL} - The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {3}, pages = {498--510}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2812183}, doi = {10.1109/TDSC.2018.2812183}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FyrbiakWSHHWWTP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuanCLXGZYJ19, author = {Le Guan and Chen Cao and Peng Liu and Xinyu Xing and Xinyang Ge and Shengzhi Zhang and Meng Yu and Trent Jaeger}, title = {Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for {ARM}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {3}, pages = {438--453}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2861756}, doi = {10.1109/TDSC.2018.2861756}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GuanCLXGZYJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HaiderJASKD19, author = {Syed Kamran Haider and Chenglu Jin and Masab Ahmad and Devu Manikantan Shila and Omer Khan and Marten van Dijk}, title = {Advancing the State-of-the-Art in Hardware Trojans Detection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {1}, pages = {18--32}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2654352}, doi = {10.1109/TDSC.2017.2654352}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HaiderJASKD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HanHW19, author = {Xiao Han and Hailiang Huang and Leye Wang}, title = {{F-PAD:} Private Attribute Disclosure Risk Estimation in Online Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {6}, pages = {1054--1069}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2019.2934096}, doi = {10.1109/TDSC.2019.2934096}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HanHW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JalaliAKJ19, author = {Amir Jalali and Reza Azarderakhsh and Mehran Mozaffari Kermani and David Jao}, title = {Supersingular Isogeny Diffie-Hellman Key Exchange on 64-Bit {ARM}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {5}, pages = {902--912}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2723891}, doi = {10.1109/TDSC.2017.2723891}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JalaliAKJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JiWCLMB19, author = {Shouling Ji and Ting Wang and Jianhai Chen and Weiqing Li and Prateek Mittal and Raheem Beyah}, title = {De-SAG: On the De-Anonymization of Structure-Attribute Graph Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {4}, pages = {594--607}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2712150}, doi = {10.1109/TDSC.2017.2712150}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JiWCLMB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JinD19, author = {Chenglu Jin and Marten van Dijk}, title = {Secure and Efficient Initialization and Authentication Protocols for {SHIELD}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {1}, pages = {156--173}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2647950}, doi = {10.1109/TDSC.2017.2647950}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JinD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JurcutCD19, author = {Anca Jurcut and Tom Coffey and Reiner Dojen}, title = {A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {6}, pages = {969--983}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2725831}, doi = {10.1109/TDSC.2017.2725831}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JurcutCD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KappesHA19, author = {Giorgos Kappes and Andromachi Hatzieleftheriou and Stergios V. Anastasiadis}, title = {Multitenant Access Control for Cloud-Aware Distributed Filesystems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {6}, pages = {1070--1085}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2715839}, doi = {10.1109/TDSC.2017.2715839}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KappesHA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Karyotis19, author = {Vasileios Karyotis}, title = {A Markov Random Field Framework for Modeling Malware Propagation in Complex Communications Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {4}, pages = {551--564}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2703622}, doi = {10.1109/TDSC.2017.2703622}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Karyotis19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KimLLTW19, author = {Myungsun Kim and Hyung Tae Lee and San Ling and Benjamin Hong Meng Tan and Huaxiong Wang}, title = {Private Compound Wildcard Queries Using Fully Homomorphic Encryption}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {5}, pages = {743--756}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2763593}, doi = {10.1109/TDSC.2017.2763593}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KimLLTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LaiCCS19, author = {Russell W. F. Lai and Kam{-}Fung Cheung and Sherman S. M. Chow and Anthony Man{-}Cho So}, title = {Another Look at Anonymous Communication}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {5}, pages = {731--742}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2828002}, doi = {10.1109/TDSC.2018.2828002}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LaiCCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LanXZZ19, author = {Xiao Lan and Jing Xu and Zhen{-}Feng Zhang and Wen{-}Tao Zhu}, title = {Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming {TLS} 1.3}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {2}, pages = {272--286}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2685382}, doi = {10.1109/TDSC.2017.2685382}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LanXZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LeeMHJJKPK19, author = {Hojoon Lee and Hyungon Moon and Ingoo Heo and DaeHee Jang and Jinsoo Jang and Kihwan Kim and Yunheung Paek and Brent ByungHoon Kang}, title = {KI-Mon {ARM:} {A} Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {2}, pages = {287--300}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2679710}, doi = {10.1109/TDSC.2017.2679710}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LeeMHJJKPK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LevitinXD19, author = {Gregory Levitin and Liudong Xing and Yuanshun Dai}, title = {Optimal Spot-Checking for Collusion Tolerance in Computer Grids}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {2}, pages = {301--312}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2690293}, doi = {10.1109/TDSC.2017.2690293}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LevitinXD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiLGLGGLL19, author = {Wei Li and Linfeng Liao and Dawu Gu and Chaoyun Li and Chenyu Ge and Zheng Guo and Ya Liu and Zhiqiang Liu}, title = {Ciphertext-Only Fault Analysis on the {LED} Lightweight Cryptosystem in the Internet of Things}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {3}, pages = {454--461}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2857770}, doi = {10.1109/TDSC.2018.2857770}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiLGLGGLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiSW19, author = {Huiyun Li and Cuiping Shao and Zheng Wang}, title = {Detecting Fault Injection Attacks Based on Compressed Sensing and Integer Linear Programming}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {3}, pages = {476--483}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2821140}, doi = {10.1109/TDSC.2018.2821140}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiYMSNC19, author = {Yannan Li and Yong Yu and Geyong Min and Willy Susilo and Jianbing Ni and Kim{-}Kwang Raymond Choo}, title = {Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {1}, pages = {72--83}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2662216}, doi = {10.1109/TDSC.2017.2662216}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiYMSNC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiZHZL19, author = {Qi Li and Xiaoyue Zou and Qun Huang and Jing Zheng and Patrick P. C. Lee}, title = {Dynamic Packet Forwarding Verification in {SDN}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {6}, pages = {915--929}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2810880}, doi = {10.1109/TDSC.2018.2810880}, timestamp = {Fri, 29 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiZHZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiaoSFB19, author = {Xiaojing Liao and Preethi Srinivasan and David Formby and Raheem A. Beyah}, title = {Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {6}, pages = {1026--1039}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2717826}, doi = {10.1109/TDSC.2017.2717826}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiaoSFB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LinXCHW19, author = {Limei Lin and Li Xu and Riqing Chen and Sun{-}Yuan Hsieh and Dajin Wang}, title = {Relating Extra Connectivity and Extra Conditional Diagnosability in Regular Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {6}, pages = {1086--1097}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2726541}, doi = {10.1109/TDSC.2017.2726541}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LinXCHW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuSCCK19, author = {Zhe Liu and Hwajeong Seo and Aniello Castiglione and Kim{-}Kwang Raymond Choo and Howon Kim}, title = {Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {3}, pages = {521--529}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2825449}, doi = {10.1109/TDSC.2018.2825449}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuSCCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LorekZK19, author = {Pawel Lorek and Filip Zag{\'{o}}rski and Michal Kulis}, title = {Strong Stationary Times and its use in Cryptography}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {5}, pages = {805--818}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2751475}, doi = {10.1109/TDSC.2017.2751475}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LorekZK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaeneGMCFV19, author = {Pieter Maene and Johannes G{\"{o}}tzfried and Tilo M{\"{u}}ller and Ruan de Clercq and Felix C. Freiling and Ingrid Verbauwhede}, title = {Atlas: Application Confidentiality in Compromised Embedded Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {3}, pages = {415--423}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2858257}, doi = {10.1109/TDSC.2018.2858257}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MaeneGMCFV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MahmoudRSOISQ19, author = {Mohamed Mahmoud and Khaled Rabieh and Ahmed B. T. Sherif and Enahoro Oriero and Muhammad Ismail and Erchin Serpedin and Khalid A. Qaraqe}, title = {Privacy-Preserving Fine-Grained Data Retrieval Schemes for Mobile Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {5}, pages = {871--884}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2714162}, doi = {10.1109/TDSC.2017.2714162}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MahmoudRSOISQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MisraTNMMH19, author = {Satyajayant Misra and Reza Tourani and Frank Natividad and Travis Mick and Nahid Ebrahimi Majd and Hong Huang}, title = {AccConF: An Access Control Framework for Leveraging In-Network Cached Data in the ICN-Enabled Wireless Edge}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {1}, pages = {5--17}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2672991}, doi = {10.1109/TDSC.2017.2672991}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MisraTNMMH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MitropoulosLPK19, author = {Dimitris Mitropoulos and Panos Louridas and Michalis Polychronakis and Angelos Dennis Keromytis}, title = {Defending Against Web Application Attacks: Approaches, Challenges and Implications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {2}, pages = {188--203}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2665620}, doi = {10.1109/TDSC.2017.2665620}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MitropoulosLPK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Munoz-GonzalezS19, author = {Luis Munoz{-}Gonzalez and Daniele Sgandurra and Mart{\'{\i}}n Barr{\`{e}}re and Emil C. Lupu}, title = {Exact Inference Techniques for the Analysis of Bayesian Attack Graphs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {2}, pages = {231--244}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2016.2627033}, doi = {10.1109/TDSC.2016.2627033}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Munoz-GonzalezS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/OsadchyD19, author = {Margarita Osadchy and Orr Dunkelman}, title = {It is All in the System's Parameters: Privacy and Security Issues in Transforming Biometric Raw Data into Binary Strings}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {5}, pages = {796--804}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2804949}, doi = {10.1109/TDSC.2018.2804949}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/OsadchyD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PalGPH19, author = {Ranjan Pal and Leana Golubchik and Konstantinos Psounis and Pan Hui}, title = {Security Pricing as Enabler of Cyber-Insurance {A} First Look at Differentiated Pricing Markets}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {2}, pages = {358--372}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2684801}, doi = {10.1109/TDSC.2017.2684801}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PalGPH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PammuCWG19, author = {Ali Akbar Pammu and Kwen{-}Siong Chong and Yi Wang and Bah{-}Hwee Gwee}, title = {A Highly Efficient Side Channel Attack with Profiling through Relevance-Learning on Physical Leakage Information}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {3}, pages = {376--387}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2864727}, doi = {10.1109/TDSC.2018.2864727}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/PammuCWG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PengWZWWYN19, author = {Sancheng Peng and Guojun Wang and Yongmei Zhou and Cong Wan and Cong Wang and Shui Yu and Jianwei Niu}, title = {An Immunization Framework for Social Networks Through Big Data Based Influence Modeling}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {6}, pages = {984--995}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2731844}, doi = {10.1109/TDSC.2017.2731844}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PengWZWWYN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PhanY19, author = {Raphael C.{-}W. Phan and Moti Yung}, title = {Paradigm Shifts in Cryptographic Engineering}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {5}, pages = {729--730}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2019.2934527}, doi = {10.1109/TDSC.2019.2934527}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PhanY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PisharodyNCAH19, author = {Sandeep Pisharody and Janakarajan Natarajan and Ankur Chowdhary and Abdullah Alshalan and Dijiang Huang}, title = {Brew: {A} Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {6}, pages = {1011--1025}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2726066}, doi = {10.1109/TDSC.2017.2726066}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PisharodyNCAH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PopeTK19, author = {Aaron S. Pope and Daniel R. Tauritz and Alexander D. Kent}, title = {Evolving Bipartite Authentication Graph Partitions}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {1}, pages = {58--71}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2652469}, doi = {10.1109/TDSC.2017.2652469}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PopeTK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/QianLZCJH19, author = {Jianwei Qian and Xiang{-}Yang Li and Chunhong Zhang and Linlin Chen and Taeho Jung and Junze Han}, title = {Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {4}, pages = {679--692}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2697854}, doi = {10.1109/TDSC.2017.2697854}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/QianLZCJH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RabiiNK19, author = {Hila Rabii and Yaara Neumeier and Osnat Keren}, title = {High Rate Robust Codes with Low Implementation Complexity}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {3}, pages = {511--520}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2816638}, doi = {10.1109/TDSC.2018.2816638}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RabiiNK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Rao19, author = {Fang{-}Yu Rao}, title = {On the Security of a Variant of ElGamal Encryption Scheme}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {4}, pages = {725--728}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2707085}, doi = {10.1109/TDSC.2017.2707085}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Rao19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RenFKDD19, author = {Ling Ren and Christopher W. Fletcher and Albert Kwon and Marten van Dijk and Srinivas Devadas}, title = {Design and Implementation of the Ascend Secure Processor}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {2}, pages = {204--216}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2687463}, doi = {10.1109/TDSC.2017.2687463}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RenFKDD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SchallerXASGSKS19, author = {Andr{\'{e}} Schaller and Wenjie Xiong and Nikolaos Athanasios Anagnostopoulos and Muhammad Umair Saleem and Sebastian Gabmeyer and Boris Skoric and Stefan Katzenbeisser and Jakub Szefer}, title = {Decay-Based {DRAM} PUFs in Commodity Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {3}, pages = {462--475}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2822298}, doi = {10.1109/TDSC.2018.2822298}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SchallerXASGSKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SeiOTO19, author = {Yuichi Sei and Hiroshi Okumura and Takao Takenouchi and Akihiko Ohsuga}, title = {Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {4}, pages = {580--593}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2698472}, doi = {10.1109/TDSC.2017.2698472}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SeiOTO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShenWLXZHR19, author = {Yiran Shen and Hongkai Wen and Chengwen Luo and Weitao Xu and Tao Zhang and Wen Hu and Daniela Rus}, title = {GaitLock: Protect Virtual and Augmented Reality Headsets Using Gait}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {3}, pages = {484--497}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2800048}, doi = {10.1109/TDSC.2018.2800048}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ShenWLXZHR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShenZHZSX19, author = {Jian Shen and Tianqi Zhou and Debiao He and Yuexin Zhang and Xingming Sun and Yang Xiang}, title = {Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {6}, pages = {996--1010}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2725953}, doi = {10.1109/TDSC.2017.2725953}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShenZHZSX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShirvanianSJK19, author = {Maliheh Shirvanian and Nitesh Saxena and Stanislaw Jarecki and Hugo Krawczyk}, title = {Building and Studying a Password Store that Perfectly Hides Passwords from Itself}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {5}, pages = {770--782}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2019.2902551}, doi = {10.1109/TDSC.2019.2902551}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShirvanianSJK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Vaidya19, author = {Jaideep Vaidya}, title = {Editorial}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {1}, pages = {1--4}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2884156}, doi = {10.1109/TDSC.2018.2884156}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Vaidya19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangLX19, author = {Boyang Wang and Ming Li and Li Xiong}, title = {FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {2}, pages = {245--258}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2684802}, doi = {10.1109/TDSC.2017.2684802}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangLX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangQ19, author = {Qian Wang and Gang Qu}, title = {A Silicon {PUF} Based Entropy Pump}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {3}, pages = {402--414}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2881695}, doi = {10.1109/TDSC.2018.2881695}, timestamp = {Wed, 25 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/WangQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangQWCZ19, author = {Xiaoguang Wang and Yong Qi and Zhi Wang and Yue Chen and Yajin Zhou}, title = {Design and Implementation of SecPod, {A} Framework for Virtualization-Based Security Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {1}, pages = {44--57}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2675991}, doi = {10.1109/TDSC.2017.2675991}, timestamp = {Wed, 19 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangQWCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangWLYZY19, author = {Juan Wang and Ru Wen and Jiangqi Li and Fei Yan and Bo Zhao and Fajiang Yu}, title = {Detecting and Mitigating Target Link-Flooding Attacks Using {SDN}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {6}, pages = {944--956}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2822275}, doi = {10.1109/TDSC.2018.2822275}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangWLYZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangXWXXT19, author = {Tianbo Wang and Chunhe Xia and Sheng Wen and Hui Xue and Yang Xiang and Shouzhong Tu}, title = {{SADI:} {A} Novel Model to Study the Propagation of Social Worms in Hierarchical Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {1}, pages = {142--155}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2651826}, doi = {10.1109/TDSC.2017.2651826}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangXWXXT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WuchnerCOP19, author = {Tobias W{\"{u}}chner and Aleksander Cislak and Mart{\'{\i}}n Ochoa and Alexander Pretschner}, title = {Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {1}, pages = {99--112}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2675881}, doi = {10.1109/TDSC.2017.2675881}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WuchnerCOP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XiangLF19, author = {Dong Xiang and Bing Li and Yi Fu}, title = {Fault-Tolerant Adaptive Routing in Dragonfly Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {2}, pages = {259--271}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2693372}, doi = {10.1109/TDSC.2017.2693372}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XiangLF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YangSG19, author = {Yingyuan Yang and Jinyuan Sun and Linke Guo}, title = {PersonaIA: {A} Lightweight Implicit Authentication System Based on Customized User Behavior Selection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {1}, pages = {113--126}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2016.2645208}, doi = {10.1109/TDSC.2016.2645208}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YangSG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YilmazFAA19, author = {Emre Yilmaz and Hakan Ferhatosmanoglu and Erman Ayday and Remzi Can Aksoy}, title = {Privacy-Preserving Aggregate Queries for Optimal Location Selection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {2}, pages = {329--343}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2693986}, doi = {10.1109/TDSC.2017.2693986}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YilmazFAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YuceDGBNS19, author = {Bilgiday Yuce and Chinmay Deshpande and Marjan Ghodrati and Abhishek Bendre and Leyla Nazhandali and Patrick Schaumont}, title = {A Secure Exception Mode for Fault-Attack-Resistant Processing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {3}, pages = {388--401}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2823767}, doi = {10.1109/TDSC.2018.2823767}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YuceDGBNS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangDFL19, author = {Liwei Zhang and A. Adam Ding and Yunsi Fei and Pei Luo}, title = {Efficient Nonprofiling 2nd-Order Power Analysis on Masked Devices Utilizing Multiple Leakage Points}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {5}, pages = {843--855}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2715019}, doi = {10.1109/TDSC.2017.2715019}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangDFL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangXSM19, author = {Rui Zhang and Yuting Xiao and Shuzhou Sun and Hui Ma}, title = {Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {4}, pages = {625--634}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2700305}, doi = {10.1109/TDSC.2017.2700305}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangXSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhaoSZL19, author = {Yongwang Zhao and David San{\'{a}}n and Fuyuan Zhang and Yang Liu}, title = {Refinement-Based Specification and Security Analysis of Separation Kernels}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {1}, pages = {127--141}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2672983}, doi = {10.1109/TDSC.2017.2672983}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ZhaoSZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AdithamR18, author = {Santosh Aditham and Nagarajan Ranganathan}, title = {A System Architecture for the Detection of Insider Attacks in Big Data Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {6}, pages = {974--987}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2017.2768533}, doi = {10.1109/TDSC.2017.2768533}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AdithamR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AitzhanS18, author = {Nurzhan Zhumabekuly Aitzhan and Davor Svetinovic}, title = {Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {5}, pages = {840--852}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2616861}, doi = {10.1109/TDSC.2016.2616861}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AitzhanS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AlRubaianAHA18, author = {Majed A. AlRubaian and Muhammad Al{-}Qurishi and Mohammad Mehedi Hassan and Atif Alamri}, title = {A Credibility Analysis System for Assessing Information on Twitter}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {4}, pages = {661--674}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2602338}, doi = {10.1109/TDSC.2016.2602338}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AlRubaianAHA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AlchieriBGF18, author = {Eduardo Ad{\'{\i}}lio Pelinson Alchieri and Alysson Bessani and Fab{\'{\i}}ola Greve and Joni da Silva Fraga}, title = {Knowledge Connectivity Requirements for Solving Byzantine Consensus with Unknown Participants}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {2}, pages = {246--259}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2548460}, doi = {10.1109/TDSC.2016.2548460}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AlchieriBGF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BasinCKPSS18, author = {David A. Basin and Cas Cremers and Tiffany Hyun{-}Jin Kim and Adrian Perrig and Ralf Sasse and Pawel Szalachowski}, title = {Design, Analysis, and Implementation of {ARPKI:} An Attack-Resilient Public-Key Infrastructure}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {3}, pages = {393--408}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2601610}, doi = {10.1109/TDSC.2016.2601610}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BasinCKPSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BikosS18, author = {Anastasios N. Bikos and Nicolas Sklavos}, title = {Architecture Design of an Area Efficient High Speed Crypto Processor for 4G {LTE}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {5}, pages = {729--741}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2620437}, doi = {10.1109/TDSC.2016.2620437}, timestamp = {Fri, 15 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/BikosS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BogdanovKLS18, author = {Dan Bogdanov and Liina Kamm and Sven Laur and Ville Sokk}, title = {Rmind: {A} Tool for Cryptographically Secure Statistical Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {3}, pages = {481--495}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2587623}, doi = {10.1109/TDSC.2016.2587623}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BogdanovKLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Bou-HarbAD18, author = {Elias Bou{-}Harb and Chadi Assi and Mourad Debbabi}, title = {CSC-Detector: {A} System to Infer Large-Scale Probing Campaigns}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {3}, pages = {364--377}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2593441}, doi = {10.1109/TDSC.2016.2593441}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Bou-HarbAD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CaiHGL18, author = {Zhipeng Cai and Zaobo He and Xin Guan and Yingshu Li}, title = {Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {4}, pages = {577--590}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2613521}, doi = {10.1109/TDSC.2016.2613521}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CaiHGL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChangH18, author = {Nai{-}Wen Chang and Sun{-}Yuan Hsieh}, title = {Conditional Diagnosability of (n, k)-Star Graphs Under the {PMC} Model}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {2}, pages = {207--216}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2562620}, doi = {10.1109/TDSC.2016.2562620}, timestamp = {Mon, 29 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChangH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChatterjeeRDCKV18, author = {Santanu Chatterjee and Sandip Roy and Ashok Kumar Das and Samiran Chattopadhyay and Neeraj Kumar and Athanasios V. Vasilakos}, title = {Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {5}, pages = {824--839}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2616876}, doi = {10.1109/TDSC.2016.2616876}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChatterjeeRDCKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenQLHL18, author = {Pengfei Chen and Yong Qi and Xinyi Li and Di Hou and Michael Rung{-}Tsong Lyu}, title = {ARF-Predictor: Effective Prediction of Aging-Related Failure Using Entropy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {4}, pages = {675--693}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2604381}, doi = {10.1109/TDSC.2016.2604381}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChenQLHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChoC18, author = {Jin{-}Hee Cho and Ing{-}Ray Chen}, title = {{PROVEST:} Provenance-Based Trust Model for Delay Tolerant Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {1}, pages = {151--165}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2530705}, doi = {10.1109/TDSC.2016.2530705}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChoC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CotroneoLN18, author = {Domenico Cotroneo and Anna Lanzaro and Roberto Natella}, title = {Faultprog: Testing the Accuracy of Binary-Level Software Fault Injection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {1}, pages = {40--53}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2522968}, doi = {10.1109/TDSC.2016.2522968}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CotroneoLN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CotroneoPP18, author = {Domenico Cotroneo and Karthik Pattabiraman and Antonio Pecchia}, title = {Guest Editors' Introduction: Special Issue on Data-Driven Dependability and Security}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {6}, pages = {913--914}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2018.2813891}, doi = {10.1109/TDSC.2018.2813891}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CotroneoPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CresciPPST18, author = {Stefano Cresci and Roberto Di Pietro and Marinella Petrocchi and Angelo Spognardi and Maurizio Tesconi}, title = {Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {4}, pages = {561--576}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2017.2681672}, doi = {10.1109/TDSC.2017.2681672}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/CresciPPST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CuiWDWL18, author = {Hui Cui and Zhiguo Wan and Robert H. Deng and Guilin Wang and Yingjiu Li}, title = {Efficient and Expressive Keyword Search Over Encrypted Data in Cloud}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {3}, pages = {409--422}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2599883}, doi = {10.1109/TDSC.2016.2599883}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CuiWDWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/El-SayedS18, author = {Nosayba El{-}Sayed and Bianca Schroeder}, title = {Understanding Practical Tradeoffs in {HPC} Checkpoint-Scheduling Policies}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {2}, pages = {336--350}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2548463}, doi = {10.1109/TDSC.2016.2548463}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/El-SayedS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/EvtyushkinEOPAR18, author = {Dmitry Evtyushkin and Jesse Elwell and Meltem Ozsoy and Dmitry Ponomarev and Nael B. Abu{-}Ghazaleh and Ryan Riley}, title = {Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {3}, pages = {437--451}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2596287}, doi = {10.1109/TDSC.2016.2596287}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/EvtyushkinEOPAR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FaghihB18, author = {Fathiyeh Faghih and Borzoo Bonakdarpour}, title = {Symbolic Synthesis of Timed Models with Strict 2-Phase Fault Recovery}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {3}, pages = {526--541}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2596719}, doi = {10.1109/TDSC.2016.2596719}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FaghihB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GarciaNB18, author = {Miguel Garcia and Nuno Neves and Alysson Bessani}, title = {SieveQ: {A} Layered {BFT} Protection System for Critical Services}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {3}, pages = {511--525}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2593442}, doi = {10.1109/TDSC.2016.2593442}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GarciaNB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GollG18, author = {Martin Goll and Shay Gueron}, title = {Randomness Tests in Hostile Environments}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {2}, pages = {289--294}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2537799}, doi = {10.1109/TDSC.2016.2537799}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GollG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuanLMLXJ18, author = {Le Guan and Jingqiang Lin and Ziqiang Ma and Bo Luo and Luning Xia and Jiwu Jing}, title = {Copker: {A} Cryptographic Engine Against Cold-Boot Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {5}, pages = {742--754}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2631548}, doi = {10.1109/TDSC.2016.2631548}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/GuanLMLXJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuerarMMBPC18, author = {Meriem Guerar and Mauro Migliardi and Alessio Merlo and Mohamed Benmohammed and Francesco Palmieri and Aniello Castiglione}, title = {Using Screen Brightness to Improve Security in Mobile Social Network Access}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {4}, pages = {621--632}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2601603}, doi = {10.1109/TDSC.2016.2601603}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/GuerarMMBPC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GutierrezKCAGCB18, author = {Christopher N. Gutierrez and Taegyu Kim and Raffaele Della Corte and Jeffrey Avery and Dan Goldwasser and Marcello Cinque and Saurabh Bagchi}, title = {Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {6}, pages = {988--1001}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2018.2864993}, doi = {10.1109/TDSC.2018.2864993}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GutierrezKCAGCB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HanLNGX18, author = {Weili Han and Zhigong Li and Minyue Ni and Guofei Gu and Wenyuan Xu}, title = {Shadow Attacks Based on Password Reuses: {A} Quantitative Empirical Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {2}, pages = {309--320}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2568187}, doi = {10.1109/TDSC.2016.2568187}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HanLNGX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HeKWWCV18, author = {Debiao He and Neeraj Kumar and Huaqun Wang and Lina Wang and Kim{-}Kwang Raymond Choo and Alexey V. Vinel}, title = {A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {4}, pages = {633--645}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2596286}, doi = {10.1109/TDSC.2016.2596286}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HeKWWCV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HeZHLL18, author = {Pinjia He and Jieming Zhu and Shilin He and Jian Li and Michael R. Lyu}, title = {Towards Automated Log Parsing for Large-Scale Log Data Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {6}, pages = {931--944}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2017.2762673}, doi = {10.1109/TDSC.2017.2762673}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HeZHLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JangCLKLCK18, author = {Jin Soo Jang and Changho Choi and Jae{-}Hyuk Lee and Nohyun Kwak and Seongman Lee and Yeseul Choi and Brent ByungHoon Kang}, title = {PrivateZone: Providing a Private Execution Environment Using {ARM} TrustZone}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {5}, pages = {797--810}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2622261}, doi = {10.1109/TDSC.2016.2622261}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JangCLKLCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JhaFMDKKI18, author = {Saurabh Jha and Valerio Formicola and Catello Di Martino and Mark Dalton and William T. Kramer and Zbigniew Kalbarczyk and Ravishankar K. Iyer}, title = {Resiliency of {HPC} Interconnects: {A} Case Study of Interconnect Failures and Recovery in Blue Waters}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {6}, pages = {915--930}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2017.2737537}, doi = {10.1109/TDSC.2017.2737537}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JhaFMDKKI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JiangWYXZ18, author = {Jiao Jiao Jiang and Sheng Wen and Shui Yu and Yang Xiang and Wanlei Zhou}, title = {Rumor Source Identification in Social Networks with Time-Varying Topology}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {1}, pages = {166--179}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2522436}, doi = {10.1109/TDSC.2016.2522436}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JiangWYXZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JohnsonLEF18, author = {Pontus Johnson and Robert Lagerstr{\"{o}}m and Mathias Ekstedt and Ulrik Franke}, title = {Can the Common Vulnerability Scoring System be Trusted? {A} Bayesian Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {6}, pages = {1002--1015}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2644614}, doi = {10.1109/TDSC.2016.2644614}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JohnsonLEF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JungHL18, author = {Taeho Jung and Junze Han and Xiang{-}Yang Li}, title = {{PDA:} Semantically Secure Time-Series Data Analytics with Dynamic User Groups}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {2}, pages = {260--274}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2577034}, doi = {10.1109/TDSC.2016.2577034}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JungHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KaminagaYSS18, author = {Masahiro Kaminaga and Hideki Yoshikawa and Arimitsu Shikoda and Toshinori Suzuki}, title = {Crashing Modulus Attack on Modular Squaring for Rabin Cryptosystem}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {4}, pages = {723--728}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2602352}, doi = {10.1109/TDSC.2016.2602352}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KaminagaYSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KhanAAKZ18, author = {Muhammad Usman Shahid Khan and Mazhar Ali and Assad Abbas and Samee U. Khan and Albert Y. Zomaya}, title = {Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {4}, pages = {551--560}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2616879}, doi = {10.1109/TDSC.2016.2616879}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KhanAAKZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KimHSJ18, author = {Jun Young Kim and Wen Hu and Hossein Shafagh and Sanjay Jha}, title = {{SEDA:} Secure Over-the-Air Code Dissemination Protocol for the Internet of Things}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {6}, pages = {1041--1054}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2639503}, doi = {10.1109/TDSC.2016.2639503}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KimHSJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KimLLW18, author = {Myungsun Kim and Hyung Tae Lee and San Ling and Huaxiong Wang}, title = {On the Efficiency of FHE-Based Private Queries}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {2}, pages = {357--363}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2568182}, doi = {10.1109/TDSC.2016.2568182}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KimLLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LalehCF18, author = {Naeimeh Laleh and Barbara Carminati and Elena Ferrari}, title = {Risk Assessment in Social Networks Based on User Anomalous Behaviors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {2}, pages = {295--308}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2540637}, doi = {10.1109/TDSC.2016.2540637}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LalehCF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LeeKLCYLL18, author = {Suchul Lee and Sungho Kim and Sungil Lee and Jaehyuk Choi and Hanjun Yoon and Dohoon Lee and Jun{-}Rak Lee}, title = {LARGen: Automatic Signature Generation for Malwares Using Latent Dirichlet Allocation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {5}, pages = {771--783}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2609907}, doi = {10.1109/TDSC.2016.2609907}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LeeKLCYLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiHWZ18, author = {Bing Li and Dijiang Huang and Zhijie Wang and Yan Zhu}, title = {Attribute-based Access Control for {ICN} Naming Scheme}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {2}, pages = {194--206}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2550437}, doi = {10.1109/TDSC.2016.2550437}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiHWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiLXYD18, author = {Yan Li and Yingjiu Li and Ke Xu and Qiang Yan and Robert H. Deng}, title = {Empirical Study of Face Authentication Systems Under {OSNFD} Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {2}, pages = {231--245}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2550459}, doi = {10.1109/TDSC.2016.2550459}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiLXYD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiZDLS18, author = {Huaxin Li and Haojin Zhu and Suguo Du and Xiaohui Liang and Xuemin Sherman Shen}, title = {Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {4}, pages = {646--660}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2604383}, doi = {10.1109/TDSC.2016.2604383}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiZDLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiZWLLZ18, author = {Xingxin Li and Youwen Zhu and Jian Wang and Zhe Liu and Yining Liu and Mingwu Zhang}, title = {On the Soundness and Security of Privacy-Preserving {SVM} for Outsourcing Data Classification}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {5}, pages = {906--912}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2017.2682244}, doi = {10.1109/TDSC.2017.2682244}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiZWLLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LinXWZ18, author = {Limei Lin and Li Xu and Dajin Wang and Shuming Zhou}, title = {The g-Good-Neighbor Conditional Diagnosability of Arrangement Graphs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {3}, pages = {542--548}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2593446}, doi = {10.1109/TDSC.2016.2593446}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LinXWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuCDLW18, author = {Ximeng Liu and Kim{-}Kwang Raymond Choo and Robert H. Deng and Rongxing Lu and Jian Weng}, title = {Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {1}, pages = {27--39}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2536601}, doi = {10.1109/TDSC.2016.2536601}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuCDLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuZGZLW18, author = {Bo Liu and Wanlei Zhou and Longxiang Gao and Haibo Zhou and Tom H. Luan and Sheng Wen}, title = {Malware Propagations in Wireless Ad Hoc Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {6}, pages = {1016--1026}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2642191}, doi = {10.1109/TDSC.2016.2642191}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuZGZLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Lumbiarres-Lopez18, author = {Ruben Lumbiarres{-}Lopez and Mariano L{\'{o}}pez{-}Garc{\'{\i}}a and Enrique F. Cant{\'{o}}{-}Navarro}, title = {Hardware Architecture Implemented on {FPGA} for Protecting Cryptographic Keys against Side-Channel Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {5}, pages = {898--905}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2610966}, doi = {10.1109/TDSC.2016.2610966}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Lumbiarres-Lopez18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MachidaXT18, author = {Fumio Machida and Ruofan Xia and Kishor S. Trivedi}, title = {Performability Modeling for {RAID} Storage Systems by Markov Regenerative Process}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {1}, pages = {138--150}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2015.2502240}, doi = {10.1109/TDSC.2015.2502240}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MachidaXT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MengL18, author = {Xianfu Meng and Dongxu Liu}, title = {GeTrust: {A} Guarantee-Based Trust Model in Chord-Based {P2P} Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {1}, pages = {54--68}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2530720}, doi = {10.1109/TDSC.2016.2530720}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MengL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MoXD18, author = {Yuchang Mo and Liudong Xing and Joanne Bechta Dugan}, title = {Performability Analysis of k-to-l-Out-of-n Computing Systems Using Binary Decision Diagrams}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {1}, pages = {126--137}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2015.2504092}, doi = {10.1109/TDSC.2015.2504092}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MoXD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MustafaXSS18, author = {Hossen A. Mustafa and Wenyuan Xu and Ahmad{-}Reza Sadeghi and Steffen Schulz}, title = {End-to-End Detection of Caller {ID} Spoofing Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {3}, pages = {423--436}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2580509}, doi = {10.1109/TDSC.2016.2580509}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MustafaXSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NingCDW18, author = {Jianting Ning and Zhenfu Cao and Xiaolei Dong and Lifei Wei}, title = {White-Box Traceable {CP-ABE} for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {5}, pages = {883--897}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2608343}, doi = {10.1109/TDSC.2016.2608343}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/NingCDW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NourianM18, author = {Arash Nourian and Stuart E. Madnick}, title = {A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {1}, pages = {2--13}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2015.2509994}, doi = {10.1109/TDSC.2015.2509994}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/NourianM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NovotnyKW18, author = {Petr Novotn{\'{y}} and Bong{-}Jun Ko and Alexander L. Wolf}, title = {Locating Faults in MANET-Hosted Software Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {3}, pages = {452--465}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2596284}, doi = {10.1109/TDSC.2016.2596284}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/NovotnyKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/QianZZZ18, author = {Zhenxing Qian and Hang Zhou and Xinpeng Zhang and Weiming Zhang}, title = {Separable Reversible Data Hiding in Encrypted {JPEG} Bitstreams}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {6}, pages = {1055--1067}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2634161}, doi = {10.1109/TDSC.2016.2634161}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/QianZZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/QiuXZ18, author = {Meikang Qiu and Yang Xiang and Yan Zhang}, title = {Guest Editor's Introduction to the Special Section on Social Network Security}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {4}, pages = {549--550}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2018.2841441}, doi = {10.1109/TDSC.2018.2841441}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/QiuXZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RothM18, author = {Thomas Roth and Bruce McMillin}, title = {Physical Attestation in the Smart Grid for Distributed State Verification}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {2}, pages = {275--288}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2577021}, doi = {10.1109/TDSC.2016.2577021}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RothM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SaracinoSDM18, author = {Andrea Saracino and Daniele Sgandurra and Gianluca Dini and Fabio Martinelli}, title = {{MADAM:} Effective and Efficient Behavior-based Android Malware Detection and Prevention}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {1}, pages = {83--97}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2536605}, doi = {10.1109/TDSC.2016.2536605}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SaracinoSDM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SchwahnWCS18, author = {Oliver Schwahn and Stefan Winter and Nicolas Coppik and Neeraj Suri}, title = {How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {6}, pages = {945--958}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2017.2745574}, doi = {10.1109/TDSC.2017.2745574}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SchwahnWCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SendiLHC18, author = {Alireza Shameli Sendi and Habib Louafi and Wenbo He and Mohamed Cheriet}, title = {Dynamic Optimal Countermeasure Selection for Intrusion Response System}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {5}, pages = {755--770}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2615622}, doi = {10.1109/TDSC.2016.2615622}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SendiLHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShintreGB18, author = {Saurabh Shintre and Virgil D. Gligor and Jo{\~{a}}o Barros}, title = {Anonymity Leakage in Private VoIP Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {1}, pages = {14--26}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2015.2513761}, doi = {10.1109/TDSC.2015.2513761}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShintreGB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SomaniGSCR18, author = {Gaurav Somani and Manoj Singh Gaur and Dheeraj Sanghi and Mauro Conti and Muttukrishnan Rajarajan}, title = {Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {6}, pages = {959--973}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2017.2763160}, doi = {10.1109/TDSC.2017.2763160}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SomaniGSCR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/StanekK18, author = {Jan Stanek and Lukas Kencl}, title = {Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {4}, pages = {694--707}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2603501}, doi = {10.1109/TDSC.2016.2603501}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/StanekK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SunCYC18, author = {Hung{-}Min Sun and Shiuan{-}Tung Chen and Jyh{-}Haw Yeh and Chia{-}Yun Cheng}, title = {A Shoulder Surfing Resistant Graphical Authentication System}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {2}, pages = {180--193}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2539942}, doi = {10.1109/TDSC.2016.2539942}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SunCYC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SunFGLXZ18, author = {Daniel Sun and Alan D. Fekete and Vincent Gramoli and Guoqiang Li and Xiwei Xu and Liming Zhu}, title = {R\({}^{\mbox{2}}\)C: Robust Rolling-Upgrade in Clouds}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {5}, pages = {811--823}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2615919}, doi = {10.1109/TDSC.2016.2615919}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SunFGLXZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TangW18, author = {Qiang Tang and Jun Wang}, title = {Privacy-Preserving Friendship-Based Recommender Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {5}, pages = {784--796}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2631533}, doi = {10.1109/TDSC.2016.2631533}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TangW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TsigkanosPGN18, author = {Christos Tsigkanos and Liliana Pasquale and Carlo Ghezzi and Bashar Nuseibeh}, title = {On the Interplay Between Cyber and Physical Spaces for Adaptive Security}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {3}, pages = {466--480}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2599880}, doi = {10.1109/TDSC.2016.2599880}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TsigkanosPGN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Vaidya18, author = {Jaideep Vaidya}, title = {Editorial}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {1}, pages = {1}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2017.2779333}, doi = {10.1109/TDSC.2017.2779333}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Vaidya18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WanD18, author = {Zhiguo Wan and Robert H. Deng}, title = {VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {6}, pages = {1083--1095}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2635128}, doi = {10.1109/TDSC.2016.2635128}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WanD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangF18, author = {Boyang Wang and Xinxin Fan}, title = {Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {6}, pages = {1027--1040}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2634013}, doi = {10.1109/TDSC.2016.2634013}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangHDCLZ18, author = {Qian Wang and Meiqi He and Minxin Du and Sherman S. M. Chow and Russell W. F. Lai and Qin Zou}, title = {Searchable Encryption over Feature-Rich Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {3}, pages = {496--510}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2593444}, doi = {10.1109/TDSC.2016.2593444}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangHDCLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangLHPF18, author = {Tao Wang and Yao Liu and Tao Hou and Qingqi Pei and Song Fang}, title = {Signal Entanglement Based Pinpoint Waveforming for Location-Restricted Service Access Control}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {5}, pages = {853--867}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2614820}, doi = {10.1109/TDSC.2016.2614820}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangLHPF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangW18, author = {Ding Wang and Ping Wang}, title = {Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {4}, pages = {708--722}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2605087}, doi = {10.1109/TDSC.2016.2605087}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangZLWQR18, author = {Qian Wang and Yan Zhang and Xiao Lu and Zhibo Wang and Zhan Qin and Kui Ren}, title = {Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {4}, pages = {591--606}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2599873}, doi = {10.1109/TDSC.2016.2599873}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangZLWQR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WeiCH18, author = {Chia{-}Chen Wei and Chun{-}An Chen and Sun{-}Yuan Hsieh}, title = {Conditional (t, k)-Diagnosis in Regular and Irregular Graphs Under the Comparison Diagnosis Model}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {2}, pages = {351--356}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2585489}, doi = {10.1109/TDSC.2016.2585489}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WeiCH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Yavuz18, author = {Attila Altay Yavuz}, title = {Immutable Authentication and Integrity Schemes for Outsourced Databases}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {1}, pages = {69--82}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2530708}, doi = {10.1109/TDSC.2016.2530708}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Yavuz18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YuanWWSR18, author = {Xingliang Yuan and Xinyu Wang and Cong Wang and Anna Cinzia Squicciarini and Kui Ren}, title = {Towards Privacy-Preserving and Practical Image-Centric Social Discovery}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {5}, pages = {868--882}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2609930}, doi = {10.1109/TDSC.2016.2609930}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/YuanWWSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangLNYS18, author = {Kuan Zhang and Xiaohui Liang and Jianbing Ni and Kan Yang and Xuemin Sherman Shen}, title = {Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {4}, pages = {607--620}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2626288}, doi = {10.1109/TDSC.2016.2626288}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangLNYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangLSW18, author = {Fengwei Zhang and Kevin Leach and Angelos Stavrou and Haining Wang}, title = {Towards Transparent Debugging}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {2}, pages = {321--335}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2545671}, doi = {10.1109/TDSC.2016.2545671}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangLSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangZZY18, author = {Jinxue Zhang and Rui Zhang and Yanchao Zhang and Guanhua Yan}, title = {The Rise of Social Botnets: Attacks and Countermeasures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {6}, pages = {1068--1082}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2641441}, doi = {10.1109/TDSC.2016.2641441}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangZZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhaoLLY18, author = {Dongdong Zhao and Wenjian Luo and Ran Liu and Lihua Yue}, title = {Negative Iris Recognition}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {1}, pages = {112--125}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2015.2507133}, doi = {10.1109/TDSC.2015.2507133}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhaoLLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhaoLXA18, author = {Xinxin Zhao and Lingjun Li and Guoliang Xue and Gail{-}Joon Ahn}, title = {Efficient Anonymous Message Submission}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {2}, pages = {217--230}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2556659}, doi = {10.1109/TDSC.2016.2556659}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhaoLXA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhouCGFZ18, author = {Peng Zhou and Rocky K. C. Chang and Xiaojing Gu and Minrui Fei and Jianying Zhou}, title = {Magic Train: Design of Measurement Methods against Bandwidth Inflation Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {1}, pages = {98--111}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2015.2509984}, doi = {10.1109/TDSC.2015.2509984}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhouCGFZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhouQYMWVG18, author = {Fanfu Zhou and Zhengwei Qi and Jianguo Yao and Ruhui Ma and Bin Wang and Athanasios V. Vasilakos and Haibing Guan}, title = {D\({}^{\mbox{2}}\)FL: Design and Implementation of Distributed Dynamic Fault Localization}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {3}, pages = {378--392}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2599881}, doi = {10.1109/TDSC.2016.2599881}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhouQYMWVG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0001HHKSZ17, author = {Zhe Liu and Xinyi Huang and Zhi Hu and Muhammad Khurram Khan and Hwajeong Seo and Lu Zhou}, title = {On Emerging Family of Elliptic Curves to Secure Internet of Things: {ECC} Comes of Age}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {3}, pages = {237--248}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2016.2577022}, doi = {10.1109/TDSC.2016.2577022}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/0001HHKSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AbdouMO17, author = {AbdelRahman Abdou and Ashraf Matrawy and Paul C. van Oorschot}, title = {{CPV:} Delay-Based Location Verification for the Internet}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {130--144}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2451614}, doi = {10.1109/TDSC.2015.2451614}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AbdouMO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AndersonMRVM17, author = {James W. Anderson and Hein Meling and Alexander Rasmussen and Amin Vahdat and Keith Marzullo}, title = {Local Recovery for High Availability in Strongly Consistent Cloud Services}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {172--184}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2443781}, doi = {10.1109/TDSC.2015.2443781}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AndersonMRVM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AzarderakhshFGH17, author = {Reza Azarderakhsh and Dieter Fishbein and Gurleen Grewal and Shi Hu and David Jao and Patrick Longa and Rajeev Verma}, title = {Fast Software Implementations of Bilinear Pairings}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {6}, pages = {605--619}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2507120}, doi = {10.1109/TDSC.2015.2507120}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AzarderakhshFGH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BarazzuttiFMOR17, author = {Rapha{\"{e}}l Barazzutti and Pascal Felber and Hugues Mercier and Emanuel Onica and Etienne Riviere}, title = {Efficient and Confidentiality-Preserving Content-Based Publish/Subscribe with Prefiltering}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {3}, pages = {308--325}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2449831}, doi = {10.1109/TDSC.2015.2449831}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/BarazzuttiFMOR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Bertino17, author = {Elisa Bertino}, title = {The State of the Journal Editorial}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {1}, pages = {1}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2016.2634638}, doi = {10.1109/TDSC.2016.2634638}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Bertino17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Bertino17a, author = {Elisa Bertino}, title = {Editor's Note}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {6}, pages = {577}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2017.2767518}, doi = {10.1109/TDSC.2017.2767518}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Bertino17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BhuiyanWWCLW17, author = {Md. Zakirul Alam Bhuiyan and Guojun Wang and Jie Wu and Jiannong Cao and Xuefeng Liu and Tian Wang}, title = {Dependable Structural Health Monitoring Using Wireless Sensor Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {4}, pages = {363--376}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2469655}, doi = {10.1109/TDSC.2015.2469655}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BhuiyanWWCLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BissiasLLP17, author = {George Bissias and Brian Neil Levine and Marc Liberatore and Swagatika Prusty}, title = {Forensic Identification of Anonymous Sources in OneSwarm}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {6}, pages = {620--632}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2497706}, doi = {10.1109/TDSC.2015.2497706}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BissiasLLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BonolaBPPM17, author = {Marco Bonola and Giuseppe Bianchi and Giulio Picierro and Salvatore Pontarelli and Marco Monaci}, title = {StreaMon: {A} Data-Plane Programming Abstraction for Software-Defined Stream Monitoring}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {6}, pages = {664--678}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2499747}, doi = {10.1109/TDSC.2015.2499747}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/BonolaBPPM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BorchertSS17, author = {Christoph Borchert and Horst Schirmeier and Olaf Spinczyk}, title = {Generic Soft-Error Detection and Correction for Concurrent Data Structures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {1}, pages = {22--36}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2427832}, doi = {10.1109/TDSC.2015.2427832}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BorchertSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CamaraLLVV17, author = {Javier C{\'{a}}mara and Rog{\'{e}}rio de Lemos and Nuno Laranjeiro and Rafael Ventura and Marco Vieira}, title = {Robustness-Driven Resilience Evaluation of Self-Adaptive Software Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {1}, pages = {50--64}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2429128}, doi = {10.1109/TDSC.2015.2429128}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CamaraLLVV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChooKAG17, author = {Kim{-}Kwang Raymond Choo and Mehran Mozaffari Kermani and Reza Azarderakhsh and Manimaran Govindarasu}, title = {Emerging Embedded and Cyber Physical System Security Challenges and Innovations}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {3}, pages = {235--236}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2017.2664183}, doi = {10.1109/TDSC.2017.2664183}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChooKAG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ColomboF17, author = {Pietro Colombo and Elena Ferrari}, title = {Enhancing MongoDB with Purpose-Based Access Control}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {6}, pages = {591--604}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2497680}, doi = {10.1109/TDSC.2015.2497680}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ColomboF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DimitriouK17, author = {Tassos Dimitriou and Ghassan O. Karame}, title = {Enabling Anonymous Authorization and Rewarding in the Smart Grid}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {5}, pages = {565--572}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2496211}, doi = {10.1109/TDSC.2015.2496211}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DimitriouK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/EgeleSKV17, author = {Manuel Egele and Gianluca Stringhini and Christopher Kruegel and Giovanni Vigna}, title = {Towards Detecting Compromised Accounts on Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {4}, pages = {447--460}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2479616}, doi = {10.1109/TDSC.2015.2479616}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/EgeleSKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/El-AtawyDA17, author = {Adel El{-}Atawy and Qi Duan and Ehab Al{-}Shaer}, title = {A Novel Class of Robust Covert Channels Using Out-of-Order Packets}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {116--129}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2443779}, doi = {10.1109/TDSC.2015.2443779}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/El-AtawyDA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ElmallahG17, author = {Ehab S. Elmallah and Mohamed G. Gouda}, title = {Hardness of Firewall Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {3}, pages = {339--349}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2455532}, doi = {10.1109/TDSC.2015.2455532}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ElmallahG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GoryczkaX17, author = {Slawomir Goryczka and Li Xiong}, title = {A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {5}, pages = {463--477}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2484326}, doi = {10.1109/TDSC.2015.2484326}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GoryczkaX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuinBFT17, author = {Ujjwal Guin and Swarup Bhunia and Domenic Forte and Mark Mohammad Tehranipoor}, title = {{SMA:} {A} System-Level Mutual Authentication for Protecting Electronic Hardware and Firmware}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {3}, pages = {265--278}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2016.2615609}, doi = {10.1109/TDSC.2016.2615609}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GuinBFT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuoMSHWV17, author = {Fuchun Guo and Yi Mu and Willy Susilo and Homer Hsing and Duncan S. Wong and Vijay Varadharajan}, title = {Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {211--220}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2445760}, doi = {10.1109/TDSC.2015.2445760}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GuoMSHWV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HanCAL17, author = {Yi Han and Jeffrey Chan and Tansu Alpcan and Christopher Leckie}, title = {Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {1}, pages = {95--108}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2429132}, doi = {10.1109/TDSC.2015.2429132}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HanCAL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HerderRDYD17, author = {Charles Herder and Ling Ren and Marten van Dijk and Meng{-}Day (Mandel) Yu and Srinivas Devadas}, title = {Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {1}, pages = {65--82}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2016.2536609}, doi = {10.1109/TDSC.2016.2536609}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HerderRDYD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HomescuJCBLF17, author = {Andrei Homescu and Todd Jackson and Stephen Crane and Stefan Brunthaler and Per Larsen and Michael Franz}, title = {Large-Scale Automated Software Diversity - Program Evolution Redux}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {158--171}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2433252}, doi = {10.1109/TDSC.2015.2433252}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HomescuJCBLF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/IllianoML17, author = {Vittorio P. Illiano and Luis Mu{\~{n}}oz{-}Gonz{\'{a}}lez and Emil C. Lupu}, title = {Don't fool Me!: Detection, Characterisation and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {3}, pages = {279--293}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2016.2614505}, doi = {10.1109/TDSC.2016.2614505}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/IllianoML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JiYHHLB17, author = {Shouling Ji and Shukun Yang and Xin Hu and Weili Han and Zhigong Li and Raheem A. Beyah}, title = {Zero-Sum Password Cracking Game: {A} Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {5}, pages = {550--564}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2481884}, doi = {10.1109/TDSC.2015.2481884}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JiYHHLB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Joye17, author = {Marc Joye}, title = {Cryptanalysis of a Privacy-Preserving Aggregation Protocol}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {6}, pages = {693--694}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2016.2519889}, doi = {10.1109/TDSC.2016.2519889}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Joye17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KruppSZ17, author = {Brian Krupp and Nigamanth Sridhar and Wenbing Zhao}, title = {{SPE:} Security and Privacy Enhancement Framework for Mobile Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {4}, pages = {433--446}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2465965}, doi = {10.1109/TDSC.2015.2465965}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KruppSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Kupcu17, author = {Alptekin K{\"{u}}p{\c{c}}{\"{u}}}, title = {Incentivized Outsourced Computation Resistant to Malicious Contractors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {6}, pages = {633--649}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2499738}, doi = {10.1109/TDSC.2015.2499738}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Kupcu17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiSLSJ17, author = {Jingwei Li and Anna Cinzia Squicciarini and Dan Lin and Smitha Sundareswaran and Chunfu Jia}, title = {MMB\({}^{\mbox{cloud}}\)-Tree: Authenticated Index for Verifiable Cloud Service Selection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {185--198}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2445752}, doi = {10.1109/TDSC.2015.2445752}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiSLSJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiSZX17, author = {Qi Li and Ravi S. Sandhu and Xinwen Zhang and Mingwei Xu}, title = {Mandatory Content Access Control for Privacy Protection in Information Centric Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {5}, pages = {494--506}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2494049}, doi = {10.1109/TDSC.2015.2494049}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiSZX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuCCYP17, author = {Hongbo Liu and Yingying Chen and Mooi Choo Chuah and Jie Yang and H. Vincent Poor}, title = {Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {4}, pages = {377--391}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2479624}, doi = {10.1109/TDSC.2015.2479624}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuCCYP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaZWLL17, author = {Hui Ma and Rui Zhang and Zhiguo Wan and Yao Lu and Suqing Lin}, title = {Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {6}, pages = {679--692}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2499755}, doi = {10.1109/TDSC.2015.2499755}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MaZWLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MoonLHKPK17, author = {Hyungon Moon and Hojoon Lee and Ingoo Heo and Kihwan Kim and Yunheung Paek and Brent ByungHoon Kang}, title = {Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {145--157}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2443803}, doi = {10.1109/TDSC.2015.2443803}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MoonLHKPK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NadjiPA17, author = {Yacin Nadji and Roberto Perdisci and Manos Antonakakis}, title = {Still Beheading Hydras: Botnet Takedowns Then and Now}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {5}, pages = {535--549}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2496176}, doi = {10.1109/TDSC.2015.2496176}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/NadjiPA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PakC17, author = {Wooguil Pak and Young{-}June Choi}, title = {High Performance and High Scalable Packet Classification Algorithm for Network Security Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {1}, pages = {37--49}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2443773}, doi = {10.1109/TDSC.2015.2443773}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PakC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PilaramE17, author = {Hossein Pilaram and Taraneh Eghlidos}, title = {An Efficient Lattice Based Multi-Stage Secret Sharing Scheme}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {1}, pages = {2--8}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2432800}, doi = {10.1109/TDSC.2015.2432800}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PilaramE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RabiehMAT17, author = {Khaled Rabieh and Mohamed M. E. A. Mahmoud and Kemal Akkaya and Samet Tonyali}, title = {Scalable Certificate Revocation Schemes for Smart Grid {AMI} Networks Using Bloom Filters}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {4}, pages = {420--432}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2467385}, doi = {10.1109/TDSC.2015.2467385}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RabiehMAT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RahmanMAS17, author = {Mohammad Ashiqur Rahman and Mohammad Hossein Manshaei and Ehab Al{-}Shaer and Mohamed Shehab}, title = {Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {221--234}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2446492}, doi = {10.1109/TDSC.2015.2446492}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RahmanMAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RahulamathavanR17, author = {Yogachandran Rahulamathavan and Muttukrishnan Rajarajan}, title = {Efficient Privacy-Preserving Facial Expression Classification}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {3}, pages = {326--338}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2453963}, doi = {10.1109/TDSC.2015.2453963}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RahulamathavanR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RezaeiHS17, author = {Fahimeh Rezaei and Michael Hempel and Hamid Sharif}, title = {Towards a Reliable Detection of Covert Timing Channels over Real-Time Network Traffic}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {3}, pages = {249--264}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2017.2656078}, doi = {10.1109/TDSC.2017.2656078}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RezaeiHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShafiqGMPAKG17, author = {Basit Shafiq and Sameera Ghayyur and Ammar Masood and Zahid Pervaiz and Abdulrahman Almutairi and M. Farrukh Khan and Arif Ghafoor}, title = {Composability Verification of Multi-Service Workflows in a Policy-Driven Cloud Computing Environment}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {5}, pages = {478--493}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2481881}, doi = {10.1109/TDSC.2015.2481881}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShafiqGMPAKG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShinK17, author = {SeongHan Shin and Kazukuni Kobara}, title = {Security Analysis of Password-Authenticated Key Retrieval}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {5}, pages = {573--576}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2490064}, doi = {10.1109/TDSC.2015.2490064}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShinK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SuSLDH17, author = {Chunhua Su and Bagus Santoso and Yingjiu Li and Robert H. Deng and Xinyi Huang}, title = {Universally Composable {RFID} Mutual Authentication}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {1}, pages = {83--94}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2434376}, doi = {10.1109/TDSC.2015.2434376}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SuSLDH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TianDBD17, author = {Guanyu Tian and Zhenhai Duan and Todd Baumeister and Yingfei Dong}, title = {A Traceback Attack on Freenet}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {3}, pages = {294--307}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2453983}, doi = {10.1109/TDSC.2015.2453983}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TianDBD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TilocaGDAD17, author = {Marco Tiloca and Domenico De Guglielmo and Gianluca Dini and Giuseppe Anastasi and Sajal K. Das}, title = {{JAMMY:} {A} Distributed and Dynamic Solution to Selective Jamming Attack in {TDMA} WSNs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {4}, pages = {392--405}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2467391}, doi = {10.1109/TDSC.2015.2467391}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TilocaGDAD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangYLJZD17, author = {Daibin Wang and Haixia Yao and Yingjiu Li and Hai Jin and Deqing Zou and Robert H. Deng}, title = {A Secure, Usable, and Transparent Middleware for Permission Managers on Android}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {4}, pages = {350--362}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2479613}, doi = {10.1109/TDSC.2015.2479613}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangYLJZD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XiongS17, author = {Hu Xiong and Jianfei Sun}, title = {Comments on "Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing"}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {4}, pages = {461--462}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2017.2710119}, doi = {10.1109/TDSC.2017.2710119}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XiongS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuGGFL17, author = {Kaihe Xu and Yuanxiong Guo and Linke Guo and Yuguang Fang and Xiaolin Li}, title = {My Privacy My Decision: Control of Photo Sharing on Online Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {199--210}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2443795}, doi = {10.1109/TDSC.2015.2443795}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuGGFL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YangCC17, author = {Zequ Yang and Peng Cheng and Jiming Chen}, title = {Learning-Based Jamming Attack against Low-Duty-Cycle Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {6}, pages = {650--663}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2501288}, doi = {10.1109/TDSC.2015.2501288}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YangCC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangCZ17, author = {Yuan Zhang and Qingjun Chen and Sheng Zhong}, title = {Efficient and Privacy-Preserving Min and \emph{k}th Min Computations in Mobile Sensing Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {1}, pages = {9--21}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2432814}, doi = {10.1109/TDSC.2015.2432814}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangLL17, author = {Peng Zhang and Qi Li and Patrick P. C. Lee}, title = {Achieving Content-Oriented Anonymity with {CRISP}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {6}, pages = {578--590}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2498603}, doi = {10.1109/TDSC.2015.2498603}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangLLLCWC17, author = {Ji Zhang and Hongzhou Li and Xuemei Liu and Yonglong Luo and Fulong Chen and Hua Wang and Liang Chang}, title = {On Efficient and Robust Anonymization for Privacy Protection on Massive Streaming Categorical Information}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {5}, pages = {507--520}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2483503}, doi = {10.1109/TDSC.2015.2483503}, timestamp = {Wed, 14 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangLLLCWC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhengLLH17, author = {Yao Zheng and Ming Li and Wenjing Lou and Y. Thomas Hou}, title = {Location Based Handshake and Private Proximity Test with Location Tags}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {4}, pages = {406--419}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2472529}, doi = {10.1109/TDSC.2015.2472529}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhengLLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZilbermanPE17, author = {Polina Zilberman and Rami Puzis and Yuval Elovici}, title = {On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {5}, pages = {521--534}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2494039}, doi = {10.1109/TDSC.2015.2494039}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZilbermanPE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0001GK16, author = {Michael Backes and Niklas Grimm and Aniket Kate}, title = {Data Lineage in Malicious Environments}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {2}, pages = {178--191}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2399296}, doi = {10.1109/TDSC.2015.2399296}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/0001GK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AlmohriWYO16, author = {Hussain M. J. Almohri and Layne T. Watson and Danfeng Yao and Xinming Ou}, title = {Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {4}, pages = {474--487}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2411264}, doi = {10.1109/TDSC.2015.2411264}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AlmohriWYO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ArtailA16, author = {Hassan Artail and Noor Abbani}, title = {A Pseudonym Management System to Achieve Anonymity in Vehicular Ad Hoc Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {1}, pages = {106--119}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2480699}, doi = {10.1109/TDSC.2015.2480699}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ArtailA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Bertino16, author = {Elisa Bertino}, title = {The State of the Journal Editorial}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {1}, pages = {1}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2504839}, doi = {10.1109/TDSC.2015.2504839}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Bertino16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BertinoCLLSV16, author = {Elisa Bertino and Dario Catalano and Qi Li and Alex X. Liu and Anna Cinzia Squicciarini and Alexey V. Vinel}, title = {Editor's Note}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {4}, pages = {409--410}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2016.2564478}, doi = {10.1109/TDSC.2016.2564478}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BertinoCLLSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CarminatiFG16, author = {Barbara Carminati and Elena Ferrari and Michele Guglielmi}, title = {Detection of Unspecified Emergencies for Controlled Information Sharing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {6}, pages = {630--643}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2427846}, doi = {10.1109/TDSC.2015.2427846}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CarminatiFG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CastiglioneSM16, author = {Arcangelo Castiglione and Alfredo De Santis and Barbara Masucci}, title = {Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {4}, pages = {451--460}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2413415}, doi = {10.1109/TDSC.2015.2413415}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CastiglioneSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChangYD16, author = {Che{-}Yu Chang and Hsu{-}Chun Yen and Der{-}Jiunn Deng}, title = {{V2V} QoS Guaranteed Channel Access in {IEEE} 802.11p VANETs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {1}, pages = {5--17}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2399912}, doi = {10.1109/TDSC.2015.2399912}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChangYD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenBG16, author = {Ing{-}Ray Chen and Fenye Bao and Jia Guo}, title = {Trust-Based Service Management for Social Internet of Things Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {6}, pages = {684--696}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2420552}, doi = {10.1109/TDSC.2015.2420552}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChenBG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChengPS16, author = {Yuan Cheng and Jaehong Park and Ravi S. Sandhu}, title = {An Access Control Model for Online Social Networks Using User-to-User Relationships}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {4}, pages = {424--436}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2406705}, doi = {10.1109/TDSC.2015.2406705}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ChengPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DazaPLS16, author = {Vanesa Daza and Roberto Di Pietro and Flavio Lombardi and Matteo Signorini}, title = {FRoDO: Fraud Resilient Device for Off-Line Micro-Payments}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {2}, pages = {296--311}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2432813}, doi = {10.1109/TDSC.2015.2432813}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DazaPLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/EizaON16, author = {Mahmoud Hashem Eiza and Thomas J. Owens and Qiang Ni}, title = {Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {1}, pages = {32--45}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2014.2382602}, doi = {10.1109/TDSC.2014.2382602}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/EizaON16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Erguler16, author = {Imran Erguler}, title = {Achieving Flatness: Selecting the Honeywords from Existing User Passwords}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {2}, pages = {284--295}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2406707}, doi = {10.1109/TDSC.2015.2406707}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Erguler16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FangLN16, author = {Song Fang and Yao Liu and Peng Ning}, title = {Wireless Communications under Broadband Reactive Jamming Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {3}, pages = {394--408}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2399304}, doi = {10.1109/TDSC.2015.2399304}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FangLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FattaholmananR16, author = {Ali Fattaholmanan and Hamid R. Rabiee}, title = {A Large-Scale Active Measurement Study on the Effectiveness of Piece-Attack on BitTorrent Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {5}, pages = {509--518}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2420561}, doi = {10.1109/TDSC.2015.2420561}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FattaholmananR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FernandezSBS16, author = {Pedro J. Fern{\'{a}}ndez and Jos{\'{e}} Santa and Fernando Bernal{-}Hidalgo and Antonio F. Skarmeta}, title = {Securing Vehicular IPv6 Communications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {1}, pages = {46--58}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2399300}, doi = {10.1109/TDSC.2015.2399300}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FernandezSBS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HaoCZ16, author = {Feng Hao and Dylan Clarke and Avelino Francisco Zorzo}, title = {Deleting Secret Data with Public Verifiability}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {6}, pages = {617--629}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2423684}, doi = {10.1109/TDSC.2015.2423684}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HaoCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HongK16, author = {Jin B. Hong and Dong Seong Kim}, title = {Assessing the Effectiveness of Moving Target Defenses Using Security Models}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {2}, pages = {163--177}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2443790}, doi = {10.1109/TDSC.2015.2443790}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/HongK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HuangWLZZW16, author = {Xin{-}Lin Huang and Jun Wu and Wenfeng Li and Zhifeng Zhang and Fusheng Zhu and Minghao Wu}, title = {Historical Spectrum Sensing Data Mining for Cognitive Radio Enabled Vehicular Ad-Hoc Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {1}, pages = {59--70}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2453967}, doi = {10.1109/TDSC.2015.2453967}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HuangWLZZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Jiang16, author = {Shaoquan Jiang}, title = {Group Key Agreement with Local Connectivity}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {3}, pages = {326--339}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2399299}, doi = {10.1109/TDSC.2015.2399299}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Jiang16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KaynarS16, author = {Kerem Kaynar and Fikret Sivrikaya}, title = {Distributed Attack Graph Generation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {5}, pages = {519--532}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2423682}, doi = {10.1109/TDSC.2015.2423682}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KaynarS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KloiberHSSG16, author = {Bernhard Kloiber and J{\'{e}}r{\^{o}}me H{\"{a}}rri and Thomas Strang and Stephan Sand and Cristina Rico Garcia}, title = {Random Transmit Power Control for {DSRC} and its Application to Cooperative Safety}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {1}, pages = {18--31}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2449845}, doi = {10.1109/TDSC.2015.2449845}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KloiberHSSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KumarMCLR16, author = {Neeraj Kumar and Sudip Misra and Naveen K. Chilamkurti and Jong{-}Hyouk Lee and Joel J. P. C. Rodrigues}, title = {Bayesian Coalition Negotiation Game as a Utility for Secure Energy Management in a Vehicles-to-Grid Environment}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {1}, pages = {133--145}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2415489}, doi = {10.1109/TDSC.2015.2415489}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KumarMCLR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LevitinXZD16, author = {Gregory Levitin and Liudong Xing and Qingqing Zhai and Yuanshun Dai}, title = {Optimization of Full versus Incremental Periodic Backup Policy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {6}, pages = {644--656}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2413404}, doi = {10.1109/TDSC.2015.2413404}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LevitinXZD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiYLLZS16, author = {Hongwei Li and Yi Yang and Tom H. Luan and Xiaohui Liang and Liang Zhou and Xuemin Sherman Shen}, title = {Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {3}, pages = {312--325}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2406704}, doi = {10.1109/TDSC.2015.2406704}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiYLLZS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiZGCTZLL16, author = {Wei Li and Wenwen Zhang and Dawu Gu and Yanqin Cao and Zhi Tao and Zhihong Zhou and Ya Liu and Zhiqiang Liu}, title = {Impossible Differential Fault Analysis on the {LED} Lightweight Cryptosystem in the Vehicular Ad-Hoc Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {1}, pages = {84--92}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2449849}, doi = {10.1109/TDSC.2015.2449849}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiZGCTZLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiZX16, author = {Lingjun Li and Xinxin Zhao and Guoliang Xue}, title = {A Proximity Authentication System for Smartphones}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {6}, pages = {605--616}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2427848}, doi = {10.1109/TDSC.2015.2427848}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiZX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuCG16, author = {Yang Liu and Wenji Chen and Yong Guan}, title = {Identifying High-Cardinality Hosts from Network-Wide Traffic Measurements}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {5}, pages = {547--558}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2423675}, doi = {10.1109/TDSC.2015.2423675}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuCG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuHH16, author = {Yang Liu and Shiyan Hu and Tsung{-}Yi Ho}, title = {Leveraging Strategic Detection Techniques for Smart Home Pricing Cyberattacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {2}, pages = {220--235}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2427841}, doi = {10.1109/TDSC.2015.2427841}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuHH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LyuGZM16, author = {Chen Lyu and Dawu Gu and Yunze Zeng and Prasant Mohapatra}, title = {{PBA:} Prediction-Based Authentication for Vehicle-to-Vehicle Communications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {1}, pages = {71--83}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2399297}, doi = {10.1109/TDSC.2015.2399297}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LyuGZM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaoLMCW16, author = {Xianping Mao and Junzuo Lai and Qixiang Mei and Kefei Chen and Jian Weng}, title = {Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {5}, pages = {533--546}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2423669}, doi = {10.1109/TDSC.2015.2423669}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MaoLMCW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Martinez-Alvarez16, author = {Antonio Mart{\'{\i}}nez{-}{\'{A}}lvarez and Felipe Restrepo{-}Calle and Sergio Cuenca{-}Asensi and Leonardo M. Reyneri and Almudena Lindoso and Luis Entrena}, title = {A Hardware-Software Approach for On-Line Soft Error Mitigation in Interrupt-Driven Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {4}, pages = {502--508}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2014.2382593}, doi = {10.1109/TDSC.2014.2382593}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Martinez-Alvarez16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MazurczykHS16, author = {Wojciech Mazurczyk and Thomas Holt and Krzysztof Szczypiorski}, title = {Guest Editors' Introduction: Special Issue on Cyber Crime}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {2}, pages = {146--147}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2502407}, doi = {10.1109/TDSC.2015.2502407}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MazurczykHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MoXZZ16, author = {Yuchang Mo and Liudong Xing and Farong Zhong and Zhao Zhang}, title = {Reliability Evaluation of Network Systems with Dependent Propagated Failures Using Decision Diagrams}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {6}, pages = {672--683}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2433254}, doi = {10.1109/TDSC.2015.2433254}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MoXZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PanLPY0RF16, author = {Xian Pan and Zhen Ling and Aniket Pingley and Wei Yu and Nan Zhang and Kui Ren and Xinwen Fu}, title = {Password Extraction via Reconstructed Wireless Mouse Trajectory}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {4}, pages = {461--473}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2413410}, doi = {10.1109/TDSC.2015.2413410}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PanLPY0RF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PonomarevA16, author = {Stanislav Ponomarev and Travis Atkison}, title = {Industrial Control System Network Intrusion Detection by Telemetry Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {2}, pages = {252--260}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2443793}, doi = {10.1109/TDSC.2015.2443793}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PonomarevA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RajkumarS16, author = {P. V. Rajkumar and Ravi S. Sandhu}, title = {Safety Decidability for Pre-Authorization Usage Control with Finite Attribute Domains}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {5}, pages = {582--590}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2427834}, doi = {10.1109/TDSC.2015.2427834}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/RajkumarS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RiekBM16, author = {Markus Riek and Rainer B{\"{o}}hme and Tyler Moore}, title = {Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {2}, pages = {261--273}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2410795}, doi = {10.1109/TDSC.2015.2410795}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RiekBM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SamanthulaJ16, author = {Bharath K. Samanthula and Wei Jiang}, title = {Secure Multiset Intersection Cardinality and its Application to Jaccard Coefficient}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {5}, pages = {591--604}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2415482}, doi = {10.1109/TDSC.2015.2415482}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SamanthulaJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShenKSN16, author = {Hui Shen and Ram Krishnan and Rocky Slavin and Jianwei Niu}, title = {Sequence Diagram Aided Privacy Policy Specification}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {3}, pages = {381--393}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2014.2384500}, doi = {10.1109/TDSC.2014.2384500}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShenKSN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShresthaHRS16, author = {Pradhumna Lal Shrestha and Michael Hempel and Fahimeh Rezaei and Hamid Sharif}, title = {A Support Vector Machine-Based Framework for Detection of Covert Timing Channels}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {2}, pages = {274--283}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2423680}, doi = {10.1109/TDSC.2015.2423680}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShresthaHRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SongLK16, author = {Jonghyuk Song and Sangho Lee and Jong Kim}, title = {Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {3}, pages = {340--354}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2014.2382577}, doi = {10.1109/TDSC.2014.2382577}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SongLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SoodZE16, author = {Aditya K. Sood and Sherali Zeadally and Richard J. Enbody}, title = {An Empirical Study of HTTP-based Financial Botnets}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {2}, pages = {236--251}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2014.2382590}, doi = {10.1109/TDSC.2014.2382590}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SoodZE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SunP0S16, author = {Lianshan Sun and Jaehong Park and Dang Nguyen and Ravi S. Sandhu}, title = {A Provenance-Aware Access Control Framework with Typed Provenance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {4}, pages = {411--423}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2410793}, doi = {10.1109/TDSC.2015.2410793}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SunP0S16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SunSKLV16, author = {Min{-}Te Sun and Kazuya Sakai and Wei{-}Shinn Ku and Ten{-}Hwang Lai and Athanasios V. Vasilakos}, title = {Private and Secure Tag Access for Large-Scale {RFID} Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {6}, pages = {657--671}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2427833}, doi = {10.1109/TDSC.2015.2427833}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SunSKLV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TatiRKCSP16, author = {Srikar Tati and Scott Rager and Bongjun Ko and Guohong Cao and Ananthram Swami and Thomas La Porta}, title = {netCSI: {A} Generic Fault Diagnosis Algorithm for Large-Scale Failures in Computer Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {3}, pages = {355--368}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2014.2369051}, doi = {10.1109/TDSC.2014.2369051}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/TatiRKCSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TimpnerSW16, author = {Julian Timpner and Dominik Sch{\"{u}}rmann and Lars C. Wolf}, title = {Trustworthy Parking Communities: Helping Your Neighbor to Find a Space}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {1}, pages = {120--132}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2427838}, doi = {10.1109/TDSC.2015.2427838}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TimpnerSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/VasekWM16, author = {Marie Vasek and John Wadleigh and Tyler Moore}, title = {Hacking Is Not Random: {A} Case-Control Study of Webserver-Compromise Risk}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {2}, pages = {206--219}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2427847}, doi = {10.1109/TDSC.2015.2427847}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/VasekWM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/VinelMH16, author = {Alexey V. Vinel and Xiaomin Ma and Dijiang Huang}, title = {Guest Editors' Introduction: Special Issue on Reliable and Secure VANETs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {1}, pages = {2--4}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2505361}, doi = {10.1109/TDSC.2015.2505361}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/VinelMH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/VolckaertCS16, author = {Stijn Volckaert and Bart Coppens and Bjorn De Sutter}, title = {Cloning Your Gadgets: Complete {ROP} Attack Immunity with Multi-Variant Execution}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {4}, pages = {437--450}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2411254}, doi = {10.1109/TDSC.2015.2411254}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/VolckaertCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangWS16, author = {Chi{-}Wei Wang and Chia{-}Wei Wang and Shiuhpyng Shieh}, title = {ProbeBuilder: Uncovering Opaque Kernel Data Structures for Automatic Probe Construction}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {5}, pages = {568--581}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2416728}, doi = {10.1109/TDSC.2015.2416728}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WatsonSMMH16, author = {Michael R. Watson and Noor{-}ul{-}Hassan Shirazi and Angelos K. Marnerides and Andreas Mauthe and David Hutchison}, title = {Malware Detection in Cloud Computing Infrastructures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {2}, pages = {192--205}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2457918}, doi = {10.1109/TDSC.2015.2457918}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WatsonSMMH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WuZY16, author = {Zhijun Wu and Liyuan Zhang and Meng Yue}, title = {Low-Rate DoS Attacks Detection Based on Network Multifractal}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {5}, pages = {559--567}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2443807}, doi = {10.1109/TDSC.2015.2443807}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WuZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YangXYWD16, author = {Zhi Yang and Jilong Xue and Xiaoyong Yang and Xiao Wang and Yafei Dai}, title = {VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {4}, pages = {488--501}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2410792}, doi = {10.1109/TDSC.2015.2410792}, timestamp = {Wed, 23 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YangXYWD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YiBGSW16, author = {Xun Yi and Athman Bouguettaya and Dimitrios Georgakopoulos and Andy Song and Jan Willemson}, title = {Privacy Protection for Wireless Medical Sensor Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {3}, pages = {369--380}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2406699}, doi = {10.1109/TDSC.2015.2406699}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/YiBGSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YuKHXZG16, author = {Rong Yu and Jiawen Kang and Xumin Huang and Shengli Xie and Yan Zhang and Stein Gjessing}, title = {MixGroup: Accumulative Pseudonym Exchanging for Location Privacy Enhancement in Vehicular Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {1}, pages = {93--105}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2399291}, doi = {10.1109/TDSC.2015.2399291}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YuKHXZG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZawoadDH16, author = {Shams Zawoad and Amit Kumar Dutta and Ragib Hasan}, title = {Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {2}, pages = {148--162}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2482484}, doi = {10.1109/TDSC.2015.2482484}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZawoadDH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0001LHML15, author = {Xiaofeng Chen and Jin Li and Xinyi Huang and Jianfeng Ma and Wenjing Lou}, title = {New Publicly Verifiable Databases with Efficient Updates}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {5}, pages = {546--556}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2366471}, doi = {10.1109/TDSC.2014.2366471}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/0001LHML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0002HKB15, author = {Aditi Gupta and Javid Habibi and Michael S. Kirkpatrick and Elisa Bertino}, title = {Marlin: Mitigating Code Reuse Attacks Using Code Randomization}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {3}, pages = {326--337}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2345384}, doi = {10.1109/TDSC.2014.2345384}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/0002HKB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0007SZZ15, author = {Rui Zhang and Jingchao Sun and Yanchao Zhang and Chi Zhang}, title = {Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {1}, pages = {111--124}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2309133}, doi = {10.1109/TDSC.2014.2309133}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/0007SZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AhnL15, author = {Dongkyun Ahn and Gyungho Lee}, title = {A Memory-Access Validation Scheme against Payload Injection Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {4}, pages = {387--399}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2355844}, doi = {10.1109/TDSC.2014.2355844}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AhnL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BendahmaneEMY15, author = {Ahmed Bendahmane and Mohamed Essaaidi and Ahmed El Moussaoui and Ali Younes}, title = {The Effectiveness of Reputation-Based Voting for Collusion Tolerance in Large-Scale Grids}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {6}, pages = {665--674}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2369049}, doi = {10.1109/TDSC.2014.2369049}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BendahmaneEMY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Bertino15, author = {Elisa Bertino}, title = {The State of the Journal Editorial}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {2}, pages = {135}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2015.2394031}, doi = {10.1109/TDSC.2015.2394031}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Bertino15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BovenziBRB15, author = {Antonio Bovenzi and Francesco Brancati and Stefano Russo and Andrea Bondavalli}, title = {An OS-level Framework for Anomaly Detection in Complex Software Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {3}, pages = {366--372}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2334305}, doi = {10.1109/TDSC.2014.2334305}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BovenziBRB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CafaroCM15, author = {Massimo Cafaro and Roberto Civino and Barbara Masucci}, title = {On the Equivalence of Two Security Notions for Hierarchical Key Assignment Schemes in the Unconditional Setting}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {4}, pages = {485--490}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2355841}, doi = {10.1109/TDSC.2014.2355841}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CafaroCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CeccarelliMBLMB15, author = {Andrea Ceccarelli and Leonardo Montecchi and Francesco Brancati and Paolo Lollini and Angelo Marguglio and Andrea Bondavalli}, title = {Continuous and Transparent User Identity Verification for Secure Internet Services}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {3}, pages = {270--283}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2013.2297709}, doi = {10.1109/TDSC.2013.2297709}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/CeccarelliMBLMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CenGSL15, author = {Lei Cen and Christopher S. Gates and Luo Si and Ninghui Li}, title = {A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {4}, pages = {400--412}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2355839}, doi = {10.1109/TDSC.2014.2355839}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CenGSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChimYLHZ15, author = {Tat Wing Chim and Siu{-}Ming Yiu and Victor O. K. Li and Lucas Chi Kwong Hui and Jin Zhong}, title = {{PRGA:} Privacy-Preserving Recording {\&} Gateway-Assisted Authentication of Power Usage Information for Smart Grid}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {1}, pages = {85--97}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2313861}, doi = {10.1109/TDSC.2014.2313861}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChimYLHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DelacSS15, author = {Goran Delac and Marin Silic and Sinisa Srbljic}, title = {A Reliability Improvement Method for SOA-Based Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {2}, pages = {136--149}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2327971}, doi = {10.1109/TDSC.2014.2327971}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DelacSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DiaF15, author = {Ousmane Amadou Dia and Csilla Farkas}, title = {Risk Aware Query Replacement Approach for Secure Databases Performance Management}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {2}, pages = {217--229}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2306675}, doi = {10.1109/TDSC.2014.2306675}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DiaF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DuanPL15, author = {Sisi Duan and Sean Peisert and Karl N. Levitt}, title = {hBFT: Speculative Byzantine Fault Tolerance with Minimum Cost}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {1}, pages = {58--70}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2312331}, doi = {10.1109/TDSC.2014.2312331}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DuanPL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Entezari-Maleki15, author = {Reza Entezari{-}Maleki and Kishor S. Trivedi and Ali Movaghar}, title = {Performability Evaluation of Grid Environments Using Stochastic Reward Nets}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {2}, pages = {204--216}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2320741}, doi = {10.1109/TDSC.2014.2320741}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Entezari-Maleki15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuoZF15, author = {Linke Guo and Chi Zhang and Yuguang Fang}, title = {A Trust-Based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {4}, pages = {413--427}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2355824}, doi = {10.1109/TDSC.2014.2355824}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GuoZF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HarikaNJSVA15, author = {Pullamsetty Harika and Marreddy Nagajyothi and John C. John and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {Meeting Cardinality Constraints in Role Mining}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {1}, pages = {71--84}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2309117}, doi = {10.1109/TDSC.2014.2309117}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HarikaNJSVA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HeneckaR15, author = {Wilko Henecka and Matthew Roughan}, title = {Privacy-Preserving Fraud Detection Across Multiple Phone Record Databases}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {6}, pages = {640--651}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2382573}, doi = {10.1109/TDSC.2014.2382573}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HeneckaR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HolmSBE15, author = {Hannes Holm and Khurram Shahzad and Markus Buschle and Mathias Ekstedt}, title = {P\({}^{\mbox{2}}\)CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {6}, pages = {626--639}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2382574}, doi = {10.1109/TDSC.2014.2382574}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HolmSBE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HongVLKG15, author = {Yuan Hong and Jaideep Vaidya and Haibing Lu and Panagiotis Karras and Sanjay Goel}, title = {Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {5}, pages = {504--518}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2369034}, doi = {10.1109/TDSC.2014.2369034}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HongVLKG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JingAZH15, author = {Yiming Jing and Gail{-}Joon Ahn and Ziming Zhao and Hongxin Hu}, title = {Towards Automated Risk Assessment and Mitigation of Mobile Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {5}, pages = {571--584}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2366457}, doi = {10.1109/TDSC.2014.2366457}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JingAZH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JungLW15, author = {Taeho Jung and Xiang{-}Yang Li and Meng Wan}, title = {Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {1}, pages = {45--57}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2309134}, doi = {10.1109/TDSC.2014.2309134}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JungLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KholidyBH15, author = {Hisham A. Kholidy and Fabrizio Baiardi and Salim Hariri}, title = {{DDSGA:} {A} Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {2}, pages = {164--178}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2327966}, doi = {10.1109/TDSC.2014.2327966}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KholidyBH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KlinkhamerE15, author = {Alex P. Klinkhamer and Ali Ebnenasir}, title = {On the Hardness of Adding Nonmasking Fault Tolerance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {3}, pages = {338--350}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2315191}, doi = {10.1109/TDSC.2014.2315191}, timestamp = {Thu, 25 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/KlinkhamerE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LeT15, author = {Michael Le and Yuval Tamir}, title = {Fault Injection in Virtualized Systems - Challenges and Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {3}, pages = {284--297}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2334300}, doi = {10.1109/TDSC.2014.2334300}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LeT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiZZS15, author = {Qi Li and Xinwen Zhang and Xin Zhang and Purui Su}, title = {Invalidating Idealized {BGP} Security Proposals and Countermeasures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {3}, pages = {298--311}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2345381}, doi = {10.1109/TDSC.2014.2345381}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiZZS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuLK15, author = {Sisi Liu and Loukas Lazos and Marwan Krunz}, title = {Time-Delayed Broadcasting for Defeating Inside Jammers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {3}, pages = {351--365}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2334308}, doi = {10.1109/TDSC.2014.2334308}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuLK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LuWW15, author = {Zhuo Lu and Wenye Wang and Cliff Wang}, title = {Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {1}, pages = {31--44}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2316795}, doi = {10.1109/TDSC.2014.2316795}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LuWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LvM015, author = {Xixiang Lv and Yi Mu and Hui Li}, title = {Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {6}, pages = {615--625}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2382601}, doi = {10.1109/TDSC.2014.2382601}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LvM015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Megias15, author = {David Meg{\'{\i}}as}, title = {Improved Privacy-Preserving {P2P} Multimedia Distribution Based on Recombined Fingerprints}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {2}, pages = {179--189}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2320712}, doi = {10.1109/TDSC.2014.2320712}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Megias15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MitchellC15, author = {Robert Mitchell and Ing{-}Ray Chen}, title = {Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {1}, pages = {16--30}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2312327}, doi = {10.1109/TDSC.2014.2312327}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MitchellC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MohaisenMZXK15, author = {Aziz Mohaisen and Hesham Mekky and Xinwen Zhang and Haiyong Xie and Yongdae Kim}, title = {Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {6}, pages = {675--687}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2382592}, doi = {10.1109/TDSC.2014.2382592}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MohaisenMZXK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MullerF15, author = {Tilo M{\"{u}}ller and Felix C. Freiling}, title = {A Systematic Assessment of the Security of Full Disk Encryption}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {5}, pages = {491--503}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2369041}, doi = {10.1109/TDSC.2014.2369041}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MullerF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NewellOTNA15, author = {Andrew Newell and Daniel Obenshain and Thomas Tantillo and Cristina Nita{-}Rotaru and Yair Amir}, title = {Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {6}, pages = {602--614}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2373392}, doi = {10.1109/TDSC.2014.2373392}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/NewellOTNA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NiZCK15, author = {Siru Ni and Yi Zhuang and Zining Cao and Xiangying Kong}, title = {Modeling Dependability Features for Real-Time Embedded Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {2}, pages = {190--203}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2320714}, doi = {10.1109/TDSC.2014.2320714}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/NiZCK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PhungMSHV15, author = {Phu H. Phung and Maliheh Monshizadeh and Meera Sridhar and Kevin W. Hamlen and V. N. Venkatakrishnan}, title = {Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party Web Content}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {4}, pages = {443--457}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2355847}, doi = {10.1109/TDSC.2014.2355847}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PhungMSHV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PrakashVYL15, author = {Aravind Prakash and Eknath Venkataramani and Heng Yin and Zhiqiang Lin}, title = {On the Trustworthiness of Memory Analysis - An Empirical Study from the Perspective of Binary Execution}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {5}, pages = {557--570}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2366464}, doi = {10.1109/TDSC.2014.2366464}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/PrakashVYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RadhakrishnanUB15, author = {Sakthi Vignesh Radhakrishnan and A. Selcuk Uluagac and Raheem A. Beyah}, title = {{GTID:} {A} Technique for Physical Device and Device Type Fingerprinting}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {5}, pages = {519--532}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2369033}, doi = {10.1109/TDSC.2014.2369033}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RadhakrishnanUB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RamseyMTG15, author = {Benjamin W. P. Ramsey and Barry E. Mullins and Michael A. Temple and Michael R. Grimaila}, title = {Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {5}, pages = {585--596}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2366455}, doi = {10.1109/TDSC.2014.2366455}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RamseyMTG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RenesseSS15, author = {Robbert van Renesse and Nicolas Schiper and Fred B. Schneider}, title = {Vive La Diff{\'{e}}rence: Paxos vs. Viewstamped Replication vs. Zab}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {4}, pages = {472--484}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2355848}, doi = {10.1109/TDSC.2014.2355848}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RenesseSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RezvaniIBJ15, author = {Mohsen Rezvani and Aleksandar Ignjatovic and Elisa Bertino and Sanjay K. Jha}, title = {Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {1}, pages = {98--110}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2316816}, doi = {10.1109/TDSC.2014.2316816}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RezvaniIBJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SharBT15, author = {Lwin Khin Shar and Lionel C. Briand and Hee Beng Kuan Tan}, title = {Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {6}, pages = {688--707}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2373377}, doi = {10.1109/TDSC.2014.2373377}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SharBT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShebaroOB15, author = {Bilal Shebaro and Oyindamola Oluwatimi and Elisa Bertino}, title = {Context-Based Access Control Systems for Mobile Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {2}, pages = {150--163}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2320731}, doi = {10.1109/TDSC.2014.2320731}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShebaroOB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SultanaGBS15, author = {Salmin Sultana and Gabriel Ghinita and Elisa Bertino and Mohamed Shehab}, title = {A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {3}, pages = {256--269}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2013.44}, doi = {10.1109/TDSC.2013.44}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SultanaGBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SundaresanDPZ15, author = {Saravanan Sundaresan and Robin Doss and Selwyn Piramuthu and Wanlei Zhou}, title = {Secure Tag Search in {RFID} Systems Using Mobile Readers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {2}, pages = {230--242}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2302305}, doi = {10.1109/TDSC.2014.2302305}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SundaresanDPZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TapiadorORR15, author = {Juan E. Tapiador and Agust{\'{\i}}n Orfila and Arturo Ribagorda and Benjam{\'{\i}}n Ramos}, title = {Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {3}, pages = {312--325}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2013.39}, doi = {10.1109/TDSC.2013.39}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TapiadorORR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangHWC15, author = {Ding Wang and Debiao He and Ping Wang and Chao{-}Hsien Chu}, title = {Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {4}, pages = {428--442}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2355850}, doi = {10.1109/TDSC.2014.2355850}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangHWC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangKII15, author = {Long Wang and Zbigniew Kalbarczyk and Ravishankar K. Iyer and Arun Iyengar}, title = {VM-{\(\mu\)}Checkpoint: Design, Modeling, and Assessment of Lightweight In-Memory {VM} Checkpointing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {2}, pages = {243--255}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2327967}, doi = {10.1109/TDSC.2014.2327967}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangKII15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WolfCHUT15, author = {Tilman Wolf and Harikrishnan Kumarapillai Chandrikakutty and Kekai Hu and Deepak Unnikrishnan and Russell Tessier}, title = {Securing Network Processors with High-Performance Hardware Monitors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {6}, pages = {652--664}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2373378}, doi = {10.1109/TDSC.2014.2373378}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WolfCHUT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WuWCCL15, author = {Chin{-}Hsien Wu and Po{-}Han Wu and Kuo{-}Long Chen and Wen{-}Yen Chang and Kun{-}Cheng Lai}, title = {A Hotness Filter of Files for Reliable Non-Volatile Memory Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {4}, pages = {375--386}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2015.2399313}, doi = {10.1109/TDSC.2015.2399313}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WuWCCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuS15, author = {Zhongyuan Xu and Scott D. Stoller}, title = {Mining Attribute-Based Access Control Policies}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {5}, pages = {533--545}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2369048}, doi = {10.1109/TDSC.2014.2369048}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangC15, author = {Jia{-}Dong Zhang and Chi{-}Yin Chow}, title = {{REAL:} {A} Reciprocal Protocol for Location Privacy in Wireless Sensor Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {4}, pages = {458--471}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2366467}, doi = {10.1109/TDSC.2014.2366467}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhongBLA15, author = {Yuhui Zhong and Bharat K. Bhargava and Yi Lu and Pelin Angin}, title = {A Computational Dynamic Trust Model for User Authorization}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {1}, pages = {1--15}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2309126}, doi = {10.1109/TDSC.2014.2309126}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhongBLA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhuHHT15, author = {Youwen Zhu and Zhiqiu Huang and Liusheng Huang and Tsuyoshi Takagi}, title = {On the Security of {A} Privacy-Preserving Product Calculation Scheme}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {3}, pages = {373--374}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2345404}, doi = {10.1109/TDSC.2014.2345404}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhuHHT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AlmohriYK14, author = {Hussain M. J. Almohri and Danfeng Yao and Dennis G. Kafura}, title = {Process Authentication for High System Assurance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {2}, pages = {168--180}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.29}, doi = {10.1109/TDSC.2013.29}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AlmohriYK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BasilicoGMS14, author = {Nicola Basilico and Nicola Gatti and Mattia Monga and Sabrina Sicari}, title = {Security Games for Node Localization through Verifiable Multilateration}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {1}, pages = {72--85}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.30}, doi = {10.1109/TDSC.2013.30}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BasilicoGMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Bertino14, author = {Elisa Bertino}, title = {Editorial}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {1}, pages = {1}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.3}, doi = {10.1109/TDSC.2014.3}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Bertino14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CesareXZ14, author = {Silvio Cesare and Yang Xiang and Wanlei Zhou}, title = {Control Flow-Based Malware VariantDetection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {4}, pages = {307--317}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.40}, doi = {10.1109/TDSC.2013.40}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CesareXZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CheekS14, author = {Gorrell P. Cheek and Mohamed Shehab}, title = {Human Effects of Enhanced Privacy Management Models}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {2}, pages = {142--154}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.34}, doi = {10.1109/TDSC.2013.34}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CheekS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChoLL14, author = {Kwantae Cho and Byung{-}Gil Lee and Dong Hoon Lee}, title = {Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {5}, pages = {454--466}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.41}, doi = {10.1109/TDSC.2013.41}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChoLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ColomboF14, author = {Pietro Colombo and Elena Ferrari}, title = {Enforcing Obligations within RelationalDatabase Management Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {4}, pages = {318--331}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.48}, doi = {10.1109/TDSC.2013.48}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ColomboF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FiorinS14, author = {Leandro Fiorin and Mariagiovanna Sami}, title = {Fault-Tolerant Network Interfaces for Networks-on-Chip}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {1}, pages = {16--29}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.28}, doi = {10.1109/TDSC.2013.28}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FiorinS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FoketSB14, author = {Christophe Foket and Bjorn De Sutter and Koen De Bosschere}, title = {Pushing Java Type Obfuscation to the Limit}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {6}, pages = {553--567}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2305990}, doi = {10.1109/TDSC.2014.2305990}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FoketSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FonsecaSVM14, author = {Jos{\'{e}} Fonseca and Nuno Seixas and Marco Vieira and Henrique Madeira}, title = {Analysis of Field Data on Web Security Vulnerabilities}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {2}, pages = {89--100}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.37}, doi = {10.1109/TDSC.2013.37}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FonsecaSVM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FonsecaVM14, author = {Jos{\'{e}} Fonseca and Marco Vieira and Henrique Madeira}, title = {Evaluation of Web Security Mechanisms Using Vulnerability {\&} Attack Injection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {5}, pages = {440--453}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.45}, doi = {10.1109/TDSC.2013.45}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FonsecaVM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GatesCLP14, author = {Christopher S. Gates and Jing Chen and Ninghui Li and Robert W. Proctor}, title = {Effective Risk Communication for Android Apps}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {3}, pages = {252--265}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.58}, doi = {10.1109/TDSC.2013.58}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GatesCLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GatesLPSQPNM14, author = {Christopher S. Gates and Ninghui Li and Hao Peng and Bhaskar Pratim Sarma and Yuan Qi and Rahul Potharaju and Cristina Nita{-}Rotaru and Ian Molloy}, title = {Generating Summary Risk Scores for Mobile Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {3}, pages = {238--251}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2302293}, doi = {10.1109/TDSC.2014.2302293}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GatesLPSQPNM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuptaSX14, author = {Puneet Gupta and Scott D. Stoller and Zhongyuan Xu}, title = {Abductive Analysis of Administrative Policies in Rule-Based Access Control}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {5}, pages = {412--424}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.42}, doi = {10.1109/TDSC.2013.42}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GuptaSX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HanLC14, author = {Kyuseung Han and Ganghee Lee and Kiyoung Choi}, title = {Software-Level Approaches for Tolerating Transient Faults in a Coarse-GrainedReconfigurable Architecture}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {4}, pages = {392--398}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.54}, doi = {10.1109/TDSC.2013.54}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HanLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Holm14, author = {Hannes Holm}, title = {A Large-Scale Study of the Time Required to Compromise a Computer System}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {1}, pages = {2--15}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.21}, doi = {10.1109/TDSC.2013.21}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Holm14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HuangQZKX14, author = {Jianzhong Huang and Xiao Qin and Fenghao Zhang and Wei{-}Shinn Ku and Changsheng Xie}, title = {{MFTS:} {A} Multi-Level Fault-Tolerant Archiving Storage with Optimized Maintenance Bandwidth}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {6}, pages = {524--537}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2304296}, doi = {10.1109/TDSC.2014.2304296}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HuangQZKX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Lee14, author = {Younho Lee}, title = {Secure Ordered Bucketization}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {3}, pages = {292--303}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2313863}, doi = {10.1109/TDSC.2014.2313863}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Lee14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiCP14, author = {Qinghua Li and Guohong Cao and Thomas F. La Porta}, title = {Efficient and Privacy-Aware Data Aggregation in Mobile Sensing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {2}, pages = {115--129}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.31}, doi = {10.1109/TDSC.2013.31}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiCP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiWC14, author = {Xin Li and Xinyuan Wang and Wentao Chang}, title = {CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {2}, pages = {101--114}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2012.83}, doi = {10.1109/TDSC.2012.83}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiWC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiberatoreLSL14, author = {Marc Liberatore and Brian Neil Levine and Clay Shields and Brian Lynn}, title = {Efficient Tagging of Remote Peers during Child Pornography Investigations}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {5}, pages = {425--439}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.46}, doi = {10.1109/TDSC.2013.46}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiberatoreLSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuWCRZD14, author = {Wen Ming Liu and Lingyu Wang and Pengsu Cheng and Kui Ren and Shunzhi Zhu and Mourad Debbabi}, title = {{PPTP:} Privacy-Preserving Traffic Padding in Web-Based Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {6}, pages = {538--552}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2302308}, doi = {10.1109/TDSC.2014.2302308}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuWCRZD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MerloMGPC14, author = {Alessio Merlo and Mauro Migliardi and Nicola Gobbo and Francesco Palmieri and Aniello Castiglione}, title = {A Denial of Service Attack to {UMTS} Networks Using SIM-Less Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {3}, pages = {280--291}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2315198}, doi = {10.1109/TDSC.2014.2315198}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/MerloMGPC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MohammedAFD14, author = {Noman Mohammed and Dima Alhadidi and Benjamin C. M. Fung and Mourad Debbabi}, title = {Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {1}, pages = {59--71}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.22}, doi = {10.1109/TDSC.2013.22}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MohammedAFD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/OthmaneAWB14, author = {Lotfi Ben Othmane and Pelin Angin and Harold Weffers and Bharat K. Bhargava}, title = {Extending the Agile Development Process to Develop Acceptably Secure Software}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {6}, pages = {497--509}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2298011}, doi = {10.1109/TDSC.2014.2298011}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/OthmaneAWB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PolcakJM14, author = {Libor Polcak and Jakub Jirasek and Petr Matousek}, title = {Comment on "Remote Physical Device Fingerprinting"}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {5}, pages = {494--496}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.26}, doi = {10.1109/TDSC.2013.26}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PolcakJM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/QinHL14, author = {Yang Qin and Dijiang Huang and Bing Li}, title = {{STARS:} {A} Statistical Traffic Pattern Discovery System for MANETs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {2}, pages = {181--192}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.33}, doi = {10.1109/TDSC.2013.33}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/QinHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RahulamathavanPVCR14, author = {Yogachandran Rahulamathavan and Raphael Chung{-}Wei Phan and Suresh Veluru and Kanapathippillai Cumanan and Muttukrishnan Rajarajan}, title = {Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {5}, pages = {467--479}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.51}, doi = {10.1109/TDSC.2013.51}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RahulamathavanPVCR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SalakoS14, author = {Kizito Salako and Lorenzo Strigini}, title = {When Does "Diversity" in Development Reduce Common Failures? Insights from Probabilistic Modeling}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {2}, pages = {193--206}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.32}, doi = {10.1109/TDSC.2013.32}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SalakoS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShokriTPKH14, author = {Reza Shokri and George Theodorakopoulos and Panos Papadimitratos and Ehsan Kazemi and Jean{-}Pierre Hubaux}, title = {Hiding in the Mobile Crowd: LocationPrivacy through Collaboration}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {3}, pages = {266--279}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.57}, doi = {10.1109/TDSC.2013.57}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShokriTPKH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SkillenM14, author = {Adam Skillen and Mohammad Mannan}, title = {Mobiflage: Deniable Storage Encryptionfor Mobile Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {3}, pages = {224--237}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.56}, doi = {10.1109/TDSC.2013.56}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SkillenM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TangCHS14, author = {Jin Tang and Yu Cheng and Yong Hao and Wei Song}, title = {{SIP} Flooding Attack Detection with a Multi-Dimensional Sketch Design}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {6}, pages = {582--595}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2302298}, doi = {10.1109/TDSC.2014.2302298}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TangCHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TianCW14, author = {Wenhong Tian and Yu Chen and Xinyang Wang}, title = {A Note on "Orchestrating an Ensemble of MapReduce Jobs for Minimizing Their Makespan"}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {4}, pages = {390--391}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.55}, doi = {10.1109/TDSC.2013.55}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TianCW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/VadlamudiC14, author = {Satya Gautam Vadlamudi and Partha Pratim Chakrabarti}, title = {Robustness Analysis of Embedded Control Systems with Respect to Signal Perturbations: Finding Minimal Counterexamples Using Fault Injection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {1}, pages = {45--58}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.23}, doi = {10.1109/TDSC.2013.23}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/VadlamudiC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/VaidyaSFML14, author = {Jaideep Vaidya and Basit Shafiq and Wei Fan and Danish Mehmood and David Lorenzi}, title = {A Random Decision Tree Framework for Privacy-Preserving Data Mining}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {5}, pages = {399--411}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.43}, doi = {10.1109/TDSC.2013.43}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/VaidyaSFML14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/VimercatiFJLPS14, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Giovanni Livraga and Stefano Paraboschi and Pierangela Samarati}, title = {Fragmentation in Presence of Data Dependencies}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {6}, pages = {510--523}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.2295798}, doi = {10.1109/TDSC.2013.2295798}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/VimercatiFJLPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangJSCN14, author = {Lingyu Wang and Sushil Jajodia and Anoop Singhal and Pengsu Cheng and Steven Noel}, title = {k-Zero Day Safety: {A} Network Security Metric for Measuring the Risk of Unknown Vulnerabilities}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {1}, pages = {30--44}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.24}, doi = {10.1109/TDSC.2013.24}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangJSCN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WenZZXZJZ14, author = {Sheng Wen and Wei Zhou and Jun Zhang and Yang Xiang and Wanlei Zhou and Weijia Jia and Cliff C. Zou}, title = {Modeling and Analysis on the Propagation Dynamics of Modern Email Malware}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {4}, pages = {361--374}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.49}, doi = {10.1109/TDSC.2013.49}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/WenZZXZJZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XiaYLMT14, author = {Ruofan Xia and Xiaoyan Yin and Javier Alonso Lopez and Fumio Machida and Kishor S. Trivedi}, title = {Performance and Availability Modeling of ITSystems with Data Backup and Restore}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {4}, pages = {375--389}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.50}, doi = {10.1109/TDSC.2013.50}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XiaYLMT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuRCFMO14, author = {Yi Xu and Gerardo Reynaga and Sonia Chiasson and Jan{-}Michael Frahm and Fabian Monrose and Paul C. van Oorschot}, title = {Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {5}, pages = {480--493}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.52}, doi = {10.1109/TDSC.2013.52}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuRCFMO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YiBVX14, author = {Xun Yi and Elisa Bertino and Jaideep Vaidya and Chaoping Xing}, title = {Private Searching on Streaming Data Based on Keyword Frequency}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {2}, pages = {155--167}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.36}, doi = {10.1109/TDSC.2013.36}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YiBVX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YinRMQL14, author = {Shu Yin and Xiaojun Ruan and Adam Manzanares and Xiao Qin and Kenli Li}, title = {{MINT:} {A} Reliability Modeling Frameworkfor Energy-Efficient Parallel Disk Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {4}, pages = {345--360}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.47}, doi = {10.1109/TDSC.2013.47}, timestamp = {Thu, 15 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YinRMQL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangWSS14, author = {Fengwei Zhang and Jiang Wang and Kun Sun and Angelos Stavrou}, title = {HyperCheck: {A} Hardware-AssistedIntegrity Monitor}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {4}, pages = {332--344}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.53}, doi = {10.1109/TDSC.2013.53}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangWSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhaoTGAW14, author = {Jing Zhao and Kishor S. Trivedi and Michael Grottke and Javier Alonso and Yanbin Wang}, title = {Ensuring the Performance of Apache {HTTP} Server Affected by Aging}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {2}, pages = {130--141}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.38}, doi = {10.1109/TDSC.2013.38}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhaoTGAW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhauniarovichRCCF14, author = {Yury Zhauniarovich and Giovanni Russello and Mauro Conti and Bruno Crispo and Earlence Fernandes}, title = {{MOSES:} Supporting and Enforcing Security Profiles on Smartphones}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {3}, pages = {211--223}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2300482}, doi = {10.1109/TDSC.2014.2300482}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhauniarovichRCCF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AddisAPS013, author = {Bernardetta Addis and Danilo Ardagna and Barbara Panicucci and Mark S. Squillante and Li Zhang}, title = {A Hierarchical Approach for the Resource Management of Very Large Cloud Platforms}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {5}, pages = {253--272}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.4}, doi = {10.1109/TDSC.2013.4}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AddisAPS013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AlamriBT13, author = {Abdullah Alamri and Peter Bert{\'{o}}k and James A. Thom}, title = {Authorization Control for a Semantic Data Repository through an Inference Policy Engine}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {6}, pages = {328--340}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.20}, doi = {10.1109/TDSC.2013.20}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AlamriBT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BiskupL13, author = {Joachim Biskup and Lan Li}, title = {On Inference-Proof View Processing of {XML} Documents}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {2}, pages = {99--113}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.86}, doi = {10.1109/TDSC.2012.86}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BiskupL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BohliGJIM13, author = {Jens{-}Matthias Bohli and Nils Gruschka and Meiko Jensen and Luigi Lo Iacono and Ninja Marnau}, title = {Security and Privacy-Enhancing Multicloud Architectures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {4}, pages = {212--224}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.6}, doi = {10.1109/TDSC.2013.6}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BohliGJIM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BrunM13, author = {Yuriy Brun and Nenad Medvidovic}, title = {Entrusting Private Computation and Data to Untrusted Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {4}, pages = {225--238}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.13}, doi = {10.1109/TDSC.2013.13}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BrunM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CanB13, author = {Ahmet Burak Can and Bharat K. Bhargava}, title = {{SORT:} {A} Self-ORganizing Trust Model for Peer-to-Peer Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {1}, pages = {14--27}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.74}, doi = {10.1109/TDSC.2012.74}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CanB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CarminatiFG13, author = {Barbara Carminati and Elena Ferrari and Michele Guglielmi}, title = {A System for Timely and Controlled Information Sharing in Emergency Situations}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {3}, pages = {129--142}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.11}, doi = {10.1109/TDSC.2013.11}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CarminatiFG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenJZZLZS13, author = {Gang Chen and Hai Jin and Deqing Zou and Bing Bing Zhou and Zhenkai Liang and Weide Zheng and Xuanhua Shi}, title = {SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {6}, pages = {368--379}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.25}, doi = {10.1109/TDSC.2013.25}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChenJZZLZS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChungKXLH13, author = {Chun{-}Jen Chung and Pankaj Khatkar and Tianyi Xing and Jeongkeun Lee and Dijiang Huang}, title = {{NICE:} Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {4}, pages = {198--211}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.8}, doi = {10.1109/TDSC.2013.8}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChungKXLH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CostaPBC13, author = {Pedro Costa and Marcelo Pasin and Alysson Neves Bessani and Miguel P. Correia}, title = {On the Performance of Byzantine Fault-Tolerant MapReduce}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {5}, pages = {301--313}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.7}, doi = {10.1109/TDSC.2013.7}, timestamp = {Tue, 06 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CostaPBC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DistefanoPT13, author = {Salvatore Distefano and Antonio Puliafito and Kishor S. Trivedi}, title = {Guest Editors' Introduction: Special Section on Cloud Computing Assessment: Metrics, Algorithms, Policies, Models, and Evaluation Techniques}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {4}, pages = {196--197}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.27}, doi = {10.1109/TDSC.2013.27}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DistefanoPT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DistefanoPT13a, author = {Salvatore Distefano and Antonio Puliafito and Kishor S. Trivedi}, title = {Guest Editors' Introduction: Special Section on Cloud Computing Assessment: Metrics, Algorithms, Policies, Models, and Evaluation Techniques}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {5}, pages = {251--252}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.35}, doi = {10.1109/TDSC.2013.35}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DistefanoPT13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DuanPL13, author = {Lide Duan and Lu Peng and Bin Li}, title = {Predicting Architectural Vulnerability on Multithreaded Processors under Resource Contention and Sharing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {2}, pages = {114--127}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.87}, doi = {10.1109/TDSC.2012.87}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DuanPL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FreudigerMHP13, author = {Julien Freudiger and Mohammad Hossein Manshaei and Jean{-}Pierre Hubaux and David C. Parkes}, title = {Non-Cooperative Location Privacy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {2}, pages = {84--98}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.85}, doi = {10.1109/TDSC.2012.85}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FreudigerMHP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HermenierLM13, author = {Fabien Hermenier and Julia L. Lawall and Gilles Muller}, title = {BtrPlace: {A} Flexible Consolidation Manager for Highly Available Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {5}, pages = {273--286}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.5}, doi = {10.1109/TDSC.2013.5}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HermenierLM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HuAK13, author = {Hongxin Hu and Gail{-}Joon Ahn and Ketan Kulkarni}, title = {Discovery and Resolution of Anomalies in Web Access Control Policies}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {6}, pages = {341--354}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.18}, doi = {10.1109/TDSC.2013.18}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HuAK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LeeK13, author = {Sangho Lee and Jong Kim}, title = {WarningBird: {A} Near Real-Time Detection System for Suspicious URLs in Twitter Stream}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {3}, pages = {183--195}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.3}, doi = {10.1109/TDSC.2013.3}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LeeK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiGZC13, author = {Qinghua Li and Wei Gao and Sencun Zhu and Guohong Cao}, title = {To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {3}, pages = {168--182}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.84}, doi = {10.1109/TDSC.2012.84}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiGZC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaSXZ13, author = {Di Ma and Nitesh Saxena and Tuo Xiang and Yan Zhu}, title = {Location-Aware and Safer Cards: Enhancing {RFID} Security and Privacy via Location Sensing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {2}, pages = {57--69}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.89}, doi = {10.1109/TDSC.2012.89}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MaSXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MohaisenKVKK13, author = {Abedelaziz Mohaisen and Denis Foo Kune and Eugene Y. Vasserman and Myungsun Kim and Yongdae Kim}, title = {Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {6}, pages = {380--393}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.19}, doi = {10.1109/TDSC.2013.19}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MohaisenKVKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/OrtolaniGC13, author = {Stefano Ortolani and Cristiano Giuffrida and Bruno Crispo}, title = {Unprivileged Black-Box Detection of User-Space Keyloggers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {1}, pages = {40--52}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.76}, doi = {10.1109/TDSC.2012.76}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/OrtolaniGC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PapagianniLP13, author = {Chrysa A. Papagianni and Aris Leivadeas and Symeon Papavassiliou}, title = {A Cloud-Oriented Content Delivery Network Paradigm: Modeling and Assessment}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {5}, pages = {287--300}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.12}, doi = {10.1109/TDSC.2013.12}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PapagianniLP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PoturalskiPH13, author = {Marcin Poturalski and Panos Papadimitratos and Jean{-}Pierre Hubaux}, title = {Formal Analysis of Secure Neighbor Discovery in Wireless Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {6}, pages = {355--367}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.17}, doi = {10.1109/TDSC.2013.17}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PoturalskiPH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RafnssonNS13, author = {Willard Rafnsson and Keiko Nakata and Andrei Sabelfeld}, title = {Securing Class Initialization in Java-like Languages}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {1}, pages = {1--13}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.73}, doi = {10.1109/TDSC.2012.73}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RafnssonNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Raguram0XFGM13, author = {Rahul Raguram and Andrew M. White and Yi Xu and Jan{-}Michael Frahm and Pierre Georgel and Fabian Monrose}, title = {On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {3}, pages = {154--167}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.16}, doi = {10.1109/TDSC.2013.16}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Raguram0XFGM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Shan0C13, author = {Zhiyong Shan and Xin Wang and Tzi{-}cker Chiueh}, title = {Malware Clearance for Secure Commitment of OS-Level Virtual Machines}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {2}, pages = {70--83}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.88}, doi = {10.1109/TDSC.2012.88}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Shan0C13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TripunitaraL13, author = {Mahesh V. Tripunitara and Ninghui Li}, title = {The Foundational Work of Harrison-Ruzzo-Ullman Revisited}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {1}, pages = {28--39}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.77}, doi = {10.1109/TDSC.2012.77}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TripunitaraL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/VermaCC13, author = {Abhishek Verma and Ludmila Cherkasova and Roy H. Campbell}, title = {Orchestrating an Ensemble of MapReduce Jobs for Minimizing Their Makespan}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {5}, pages = {314--327}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.14}, doi = {10.1109/TDSC.2013.14}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/VermaCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuBSY13, author = {Kui Xu and Patrick Butler and Sudip Saha and Danfeng (Daphne) Yao}, title = {{DNS} for Massive-Scale Command and Control}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {3}, pages = {143--153}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.10}, doi = {10.1109/TDSC.2013.10}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuBSY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YuLZXL13, author = {Jiadi Yu and Peng Lu and Yanmin Zhu and Guangtao Xue and Minglu Li}, title = {Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {4}, pages = {239--250}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.9}, doi = {10.1109/TDSC.2013.9}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YuLZXL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AlsalehMO12, author = {Mansour Alsaleh and Mohammad Mannan and Paul C. van Oorschot}, title = {Revisiting Defenses against Large-Scale Online Password Guessing Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {128--141}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.24}, doi = {10.1109/TDSC.2011.24}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AlsalehMO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AydayF12, author = {Erman Ayday and Faramarz Fekri}, title = {Iterative Trust and Reputation Management Using Belief Propagation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {375--386}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.64}, doi = {10.1109/TDSC.2011.64}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AydayF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BarkerG12, author = {Steve Barker and Valerio Genovese}, title = {Access Control with Privacy Enhancements a Unified Approach}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {670--683}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.22}, doi = {10.1109/TDSC.2012.22}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BarkerG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BarthRSMSB12, author = {Adam Barth and Benjamin I. P. Rubinstein and Mukund Sundararajan and John C. Mitchell and Dawn Song and Peter L. Bartlett}, title = {A Learning-Based Approach to Reactive Security}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {482--493}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.42}, doi = {10.1109/TDSC.2011.42}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BarthRSMSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BishopEHW12, author = {Matt Bishop and Sophie Engle and Damien Howard and Sean Whalen}, title = {A Taxonomy of Buffer Overflow Characteristics}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {305--317}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.10}, doi = {10.1109/TDSC.2012.10}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BishopEHW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BorranHSS12, author = {Fatemeh Borran and Martin Hutle and Nuno Santos and Andr{\'{e}} Schiper}, title = {Quantitative Analysis of Consensus Algorithms}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {236--249}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.48}, doi = {10.1109/TDSC.2011.48}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BorranHSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BrickellL12, author = {Ernie Brickell and Jiangtao Li}, title = {Enhanced Privacy {ID:} {A} Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {345--360}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.63}, doi = {10.1109/TDSC.2011.63}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BrickellL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Chandrasekhar0S12, author = {Santosh Chandrasekhar and Saikat Chakrabarti and Mukesh Singhal}, title = {A Trapdoor Hash-Based Mechanism for Stream Authentication}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {699--713}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.48}, doi = {10.1109/TDSC.2012.48}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Chandrasekhar0S12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChangH12, author = {Nai{-}Wen Chang and Sun{-}Yuan Hsieh}, title = {Conditional Diagnosability of Augmented Cubes under the {PMC} Model}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {46--60}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2010.59}, doi = {10.1109/TDSC.2010.59}, timestamp = {Mon, 29 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChangH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChasakiW12, author = {Danai Chasaki and Tilman Wolf}, title = {Attacks and Defenses in the Data Plane of Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {798--810}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.50}, doi = {10.1109/TDSC.2012.50}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChasakiW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenLWH12, author = {Xiaodao Chen and Chen Liao and Tongquan Wei and Shiyan Hu}, title = {An Interconnect Reliability-Driven Routing Technique for Electromigration Failure Avoidance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {770--776}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2010.57}, doi = {10.1109/TDSC.2010.57}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChenLWH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenNM12, author = {You Chen and Steve Nyemba and Bradley A. Malin}, title = {Detecting Anomalous Insiders in Collaborative Information Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {332--344}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.11}, doi = {10.1109/TDSC.2012.11}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChenNM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChiassonSFBO12, author = {Sonia Chiasson and Elizabeth Stobert and Alain Forget and Robert Biddle and Paul C. van Oorschot}, title = {Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {222--235}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.55}, doi = {10.1109/TDSC.2011.55}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChiassonSFBO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChuGWJ12, author = {Zi Chu and Steven Gianvecchio and Haining Wang and Sushil Jajodia}, title = {Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {811--824}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.75}, doi = {10.1109/TDSC.2012.75}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChuGWJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CortinasFGLLPA12, author = {Roberto Corti{\~{n}}as and Felix C. Freiling and Marjan Ghajar{-}Azadanlou and Alberto Lafuente and Mikel Larrea and Lucia Draque Penso and Iratxe Soraluze Arriola}, title = {Secure Failure Detection and Consensus in TrustedPals}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {610--625}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.23}, doi = {10.1109/TDSC.2012.23}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CortinasFGLLPA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CucurullANS12, author = {Jordi Cucurull and Mikael Asplund and Simin Nadjm{-}Tehrani and Tiziano Santoro}, title = {Surviving Attacks in Challenged Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {917--929}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.67}, doi = {10.1109/TDSC.2012.67}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CucurullANS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DaiPJX12, author = {Weiqi Dai and T. Paul Parker and Hai Jin and Shouhuai Xu}, title = {Enhancing Data Trustworthiness via Assured Digital Signing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {838--851}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.71}, doi = {10.1109/TDSC.2012.71}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DaiPJX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DasI12, author = {Anupam Das and Mohammad Mahfuzul Islam}, title = {SecuredTrust: {A} Dynamic Trust Computation Model for Secured Communication in Multiagent Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {261--274}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.57}, doi = {10.1109/TDSC.2011.57}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DasI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DimitrakakisKM12, author = {Christos Dimitrakakis and Tom Karygiannis and Aikaterini Mitrokotsa}, title = {Guest Editors' Introduction: Special Section on Learning, Games, and Security}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {449--450}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.45}, doi = {10.1109/TDSC.2012.45}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DimitrakakisKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DolevH12, author = {Shlomi Dolev and Yinnon A. Haviv}, title = {Stabilization Enabling Technology}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {275--288}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.60}, doi = {10.1109/TDSC.2011.60}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DolevH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DongCNY12, author = {Jing Dong and Reza Curtmola and Cristina Nita{-}Rotaru and David K. Y. Yau}, title = {Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {741--755}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.39}, doi = {10.1109/TDSC.2012.39}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DongCNY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DuanCSDSB12, author = {Zhenhai Duan and Peng Chen and Fernando Sanchez and Yingfei Dong and Mary Stephenson and James Michael Barker}, title = {Detecting Spam Zombies by Monitoring Outgoing Messages}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {198--210}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.49}, doi = {10.1109/TDSC.2011.49}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DuanCSDSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FerrariT12, author = {Elena Ferrari and Bhavani M. Thuraisingham}, title = {Guest Editors' Introduction: Special Section on Data and Applications Security and Privacy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {625--626}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.58}, doi = {10.1109/TDSC.2012.58}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FerrariT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FuPT12, author = {Zhang Fu and Marina Papatriantafilou and Philippas Tsigas}, title = {Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {401--413}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.18}, doi = {10.1109/TDSC.2012.18}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FuPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HarelSRE12, author = {Amir Harel and Asaf Shabtai and Lior Rokach and Yuval Elovici}, title = {M-Score: {A} Misuseability Weight Measure}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {414--428}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.17}, doi = {10.1109/TDSC.2012.17}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HarelSRE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HerranzNS12, author = {Javier Herranz and Jordi Nin and Marc Sol{\'{e}}}, title = {More Hybrid and Secure Protection of Statistical Data Sets}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {727--740}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.40}, doi = {10.1109/TDSC.2012.40}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HerranzNS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HoWD12, author = {Jun{-}Won Ho and Matthew K. Wright and Sajal K. Das}, title = {ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {494--511}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.65}, doi = {10.1109/TDSC.2011.65}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HoWD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HolmEA12, author = {Hannes Holm and Mathias Ekstedt and Dennis Andersson}, title = {Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {825--837}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.66}, doi = {10.1109/TDSC.2012.66}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HolmEA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HuAK12, author = {Hongxin Hu and Gail{-}Joon Ahn and Ketan Kulkarni}, title = {Detecting and Resolving Firewall Policy Anomalies}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {318--331}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.20}, doi = {10.1109/TDSC.2012.20}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HuAK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/IdikaB12, author = {Nwokedi C. Idika and Bharat K. Bhargava}, title = {Extending Attack Graph-Based Security Metrics and Aggregating Their Application}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {75--85}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2010.61}, doi = {10.1109/TDSC.2010.61}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/IdikaB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/InanKGB12, author = {Ali Inan and Murat Kantarcioglu and Gabriel Ghinita and Elisa Bertino}, title = {A Hybrid Approach to Private Record Matching}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {684--698}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.46}, doi = {10.1109/TDSC.2012.46}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/InanKGB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JacksonC12, author = {Jennifer T. Jackson and Sadie Creese}, title = {Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {930--943}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.72}, doi = {10.1109/TDSC.2012.72}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JacksonC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JefferyF12, author = {Casey M. Jeffery and Renato J. O. Figueiredo}, title = {A Flexible Approach to Improving System Reliability with Virtual Lockstep}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {2--15}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2010.53}, doi = {10.1109/TDSC.2010.53}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JefferyF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KirkpatrickGB12, author = {Michael S. Kirkpatrick and Gabriel Ghinita and Elisa Bertino}, title = {Resilient Authenticated Execution of Critical Applications in Untrusted Environments}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {597--609}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.25}, doi = {10.1109/TDSC.2012.25}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KirkpatrickGB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KirkpatrickGB12a, author = {Michael S. Kirkpatrick and Gabriel Ghinita and Elisa Bertino}, title = {Privacy-Preserving Enforcement of Spatially Aware {RBAC}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {627--640}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.62}, doi = {10.1109/TDSC.2011.62}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KirkpatrickGB12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LeSK12, author = {Meixing Le and Angelos Stavrou and Brent ByungHoon Kang}, title = {DoubleGuard: Detecting Intrusions in Multitier Web Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {512--525}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.59}, doi = {10.1109/TDSC.2011.59}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LeSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiLC12, author = {Qiming Li and John C. S. Lui and Dah{-}Ming Chiu}, title = {On the Security and Efficiency of Content Distribution via Network Coding}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {211--221}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.32}, doi = {10.1109/TDSC.2011.32}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiLC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LimKW12, author = {Hoon Wei Lim and Florian Kerschbaum and Huaxiong Wang}, title = {Workflow Signatures for Business Process Compliance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {756--769}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.38}, doi = {10.1109/TDSC.2012.38}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LimKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LuVAH12, author = {Haibing Lu and Jaideep Vaidya and Vijayalakshmi Atluri and Yuan Hong}, title = {Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {655--669}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.21}, doi = {10.1109/TDSC.2012.21}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LuVAH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LuoCZC12, author = {Xiapu Luo and Edmond W. W. Chan and Peng Zhou and Rocky K. C. Chang}, title = {Robust Network Covert Communications Based on {TCP} and Enumerative Combinatorics}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {890--902}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.64}, doi = {10.1109/TDSC.2012.64}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LuoCZC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Martinez-AlvarezCRPGA12, author = {Antonio Mart{\'{\i}}nez{-}{\'{A}}lvarez and Sergio Cuenca{-}Asensi and Felipe Restrepo{-}Calle and Francisco R. Palomo and Hip{\'{o}}lito Guzm{\'{a}}n{-}Miranda and Miguel A. Aguirre}, title = {Compiler-Directed Soft Error Mitigation for Embedded Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {159--172}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.54}, doi = {10.1109/TDSC.2011.54}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/Martinez-AlvarezCRPGA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MasoumzadehJ12, author = {Amirreza Masoumzadeh and James Joshi}, title = {Preserving Structural Properties in Edge-Perturbing Anonymization Techniques for Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {877--889}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.65}, doi = {10.1109/TDSC.2012.65}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MasoumzadehJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MeiS12, author = {Alessandro Mei and Julinda Stefa}, title = {Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {569--582}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.37}, doi = {10.1109/TDSC.2012.37}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MeiS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MerentitisKPG12, author = {Andreas Merentitis and Nektarios Kranitis and Antonis M. Paschalis and Dimitris Gizopoulos}, title = {Low Energy Online Self-Test of Embedded Processors in Dependable {WSN} Nodes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {86--100}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.17}, doi = {10.1109/TDSC.2011.17}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/MerentitisKPG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MustafaZLXP12, author = {Hossen A. Mustafa and Xin Zhang and Zhenhua Liu and Wenyuan Xu and Adrian Perrig}, title = {Jamming-Resilient Multipath Routing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {852--864}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.69}, doi = {10.1109/TDSC.2012.69}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MustafaZLXP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NixK12, author = {Robert Nix and Murat Kantarcioglu}, title = {Incentive Compatible Privacy-Preserving Distributed Classification}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {451--462}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.52}, doi = {10.1109/TDSC.2011.52}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/NixK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PapadopoulosBP12, author = {Stavros Papadopoulos and Spiridon Bakiras and Dimitris Papadias}, title = {pCloud: {A} Distributed System for Practical {PIR}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {115--127}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2010.60}, doi = {10.1109/TDSC.2010.60}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PapadopoulosBP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PathakR12, author = {Manas A. Pathak and Bhiksha Raj}, title = {Large Margin Gaussian Mixture Models with Differential Privacy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {463--469}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.27}, doi = {10.1109/TDSC.2012.27}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PathakR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PerdisciCG12, author = {Roberto Perdisci and Igino Corona and Giorgio Giacinto}, title = {Early Detection of Malicious Flux Networks via Large-Scale Passive {DNS} Traffic Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {714--726}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.35}, doi = {10.1109/TDSC.2012.35}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PerdisciCG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PoolsappasitDR12, author = {Nayot Poolsappasit and Rinku Dewri and Indrajit Ray}, title = {Dynamic Security Risk Management Using Bayesian Attack Graphs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {61--74}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.34}, doi = {10.1109/TDSC.2011.34}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PoolsappasitDR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ProanoL12, author = {Alejandro Proa{\~{n}}o and Loukas Lazos}, title = {Packet-Hiding Methods for Preventing Selective Jamming Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {101--114}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.41}, doi = {10.1109/TDSC.2011.41}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ProanoL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Rebollo-MonederoFD12, author = {David Rebollo{-}Monedero and Jordi Forn{\'{e}} and Josep Domingo{-}Ferrer}, title = {Query Profile Obfuscation by Means of Optimal Query Exchange between Users}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {641--654}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.16}, doi = {10.1109/TDSC.2012.16}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/Rebollo-MonederoFD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RiboniPB12, author = {Daniele Riboni and Linda Pareschi and Claudio Bettini}, title = {JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {387--400}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.19}, doi = {10.1109/TDSC.2012.19}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RiboniPB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RodriguesLCLS12, author = {Rodrigo Rodrigues and Barbara Liskov and Kathryn Chen and Moses D. Liskov and David A. Schultz}, title = {Automatic Reconfiguration for Large-Scale Reliable Storage Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {145--158}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2010.52}, doi = {10.1109/TDSC.2010.52}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/RodriguesLCLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RuanYAYQ12, author = {Xiaojun Ruan and Qing Yang and Mohammed I. Alghamdi and Shu Yin and Xiao Qin}, title = {{ES-MPICH2:} {A} Message Passing Interface with Enhanced Security}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {361--374}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.9}, doi = {10.1109/TDSC.2012.9}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/RuanYAYQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Sandhu12, author = {Ravi S. Sandhu}, title = {Editorial}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {1}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.7}, doi = {10.1109/TDSC.2012.7}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Sandhu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Shan0C12, author = {Zhiyong Shan and Xin Wang and Tzi{-}cker Chiueh}, title = {Enforcing Mandatory Access Control in Commodity {OS} to Disable Malware}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {541--555}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.36}, doi = {10.1109/TDSC.2012.36}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Shan0C12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShehabM12, author = {Mohamed Shehab and Said Marouf}, title = {Recommendation Models for Open Authorization}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {583--596}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.34}, doi = {10.1109/TDSC.2012.34}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShehabM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SquicciariniBTB12, author = {Anna Cinzia Squicciarini and Elisa Bertino and Alberto Trombetta and Stefano Braghin}, title = {A Flexible Approach to Multisession Trust Negotiations}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {16--29}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.31}, doi = {10.1109/TDSC.2011.31}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SquicciariniBTB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SunLD12, author = {Yan Sun and Hong Luo and Sajal K. Das}, title = {A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless Multimedia Sensor Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {785--797}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.68}, doi = {10.1109/TDSC.2012.68}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SunLD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SundareswaranSL12, author = {Smitha Sundareswaran and Anna Cinzia Squicciarini and Dan Lin}, title = {Ensuring Distributed Accountability for Data Sharing in the Cloud}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {556--568}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.26}, doi = {10.1109/TDSC.2012.26}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SundareswaranSL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TangLLP12, author = {Yang Tang and Patrick P. C. Lee and John C. S. Lui and Radia J. Perlman}, title = {Secure Overlay Cloud Storage with Access Control and Assured Deletion}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {903--916}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.49}, doi = {10.1109/TDSC.2012.49}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TangLLP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangZ12, author = {Huaqun Wang and Yuqing Zhang}, title = {On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {443--446}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.53}, doi = {10.1109/TDSC.2011.53}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WuXW12, author = {Zhenyu Wu and Mengjun Xie and Haining Wang}, title = {On Energy Security of Server Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {865--876}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.70}, doi = {10.1109/TDSC.2012.70}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WuXW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuLZ12, author = {Shouhuai Xu and Wenlian Lu and Zhenxin Zhan}, title = {A Stochastic Model of Multivirus Dynamics}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {30--45}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.33}, doi = {10.1109/TDSC.2011.33}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuLZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuTSTWX12, author = {Dianxiang Xu and Manghui Tu and Michael Sanford and Lijo Thomas and Daniel Woodraska and Weifeng Xu}, title = {Automated Security Test Generation with Formal Threat Models}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {526--540}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.24}, doi = {10.1109/TDSC.2012.24}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuTSTWX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuXWSY12, author = {Kui Xu and Huijun Xiong and Chehai Wu and Deian Stefan and Danfeng Yao}, title = {Data-Provenance Verification For Secure Hosts}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {173--183}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.50}, doi = {10.1109/TDSC.2011.50}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuXWSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuZHAS12, author = {Wenjuan Xu and Xinwen Zhang and Hongxin Hu and Gail{-}Joon Ahn and Jean{-}Pierre Seifert}, title = {Remote Attestation with Domain-Based Integrity Model and Policy Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {429--442}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.61}, doi = {10.1109/TDSC.2011.61}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuZHAS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Yi12, author = {Xun Yi}, title = {Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {303--304}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2010.42}, doi = {10.1109/TDSC.2010.42}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Yi12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhanSD12, author = {Guoxing Zhan and Weisong Shi and Hongmei Julia Deng}, title = {Design and Implementation of {TARF:} {A} Trust-Aware Routing Framework for WSNs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {184--197}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.58}, doi = {10.1109/TDSC.2011.58}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhanSD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhaoHAW12, author = {Ziming Zhao and Hongxin Hu and Gail{-}Joon Ahn and Ruoyu Wu}, title = {Risk-Aware Mitigation for {MANET} Routing Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {250--260}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.51}, doi = {10.1109/TDSC.2011.51}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhaoHAW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhuLV12, author = {Ye Zhu and Yuanchao Lu and Anil Vikram}, title = {On Privacy of Encrypted Speech Communications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {470--481}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.56}, doi = {10.1109/TDSC.2011.56}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhuLV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Zuo12, author = {Yanjun Zuo}, title = {Survivability Experiment and Attack Characterization for {RFID}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {289--302}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.30}, doi = {10.1109/TDSC.2011.30}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Zuo12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AliotoPR10, author = {Massimo Alioto and Massimo Poli and Santina Rocchi}, title = {Differential Power Analysis Attacks to Precharged Buses: {A} General Analysis for Symmetric-Key Cryptographic Algorithms}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {3}, pages = {226--239}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2009.1}, doi = {10.1109/TDSC.2009.1}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AliotoPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AmirDDKLNOZ10, author = {Yair Amir and Claudiu Danilov and Danny Dolev and Jonathan Kirsch and John Lane and Cristina Nita{-}Rotaru and Josh Olsen and David Zage}, title = {Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {1}, pages = {80--93}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.53}, doi = {10.1109/TDSC.2008.53}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AmirDDKLNOZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BernardiPGR10, author = {Paolo Bernardi and Let{\'{\i}}cia Maria Veiras Bolzani Poehls and Michelangelo Grosso and Matteo Sonza Reorda}, title = {A Hybrid Approach for Detection and Correction of Transient Faults in SoCs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {4}, pages = {439--445}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2010.33}, doi = {10.1109/TDSC.2010.33}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BernardiPGR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BoudaliCS10, author = {Hichem Boudali and Pepijn Crouzen and Mari{\"{e}}lle Stoelinga}, title = {A Rigorous, Compositional, and Extensible Framework for Dynamic Fault Tree Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {2}, pages = {128--143}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2009.45}, doi = {10.1109/TDSC.2009.45}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BoudaliCS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BoydKLKP10, author = {Stephen W. Boyd and Gaurav S. Kc and Michael E. Locasto and Angelos D. Keromytis and Vassilis Prevelakis}, title = {On the General Applicability of Instruction-Set Randomization}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {3}, pages = {255--270}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.58}, doi = {10.1109/TDSC.2008.58}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BoydKLKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Fallah10, author = {Mehran S. Fallah}, title = {A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {1}, pages = {5--19}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.13}, doi = {10.1109/TDSC.2008.13}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Fallah10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GaoDZAI10, author = {Lei Gao and Michael Dahlin and Jiandan Zheng and Lorenzo Alvisi and Arun Iyengar}, title = {Dual-Quorum: {A} Highly Available and Consistent Replication System for Edge Services}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {2}, pages = {159--174}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.36}, doi = {10.1109/TDSC.2008.36}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GaoDZAI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GaonkarKMS10, author = {Shravan Gaonkar and Kimberly Keeton and Arif Merchant and William H. Sanders}, title = {Designing Dependable Storage Solutions for Shared Application Environments}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {4}, pages = {366--380}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.38}, doi = {10.1109/TDSC.2008.38}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/GaonkarKMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Gligor10, author = {Virgil D. Gligor}, title = {Editorial}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {1}, pages = {1--3}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2010.9}, doi = {10.1109/TDSC.2010.9}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Gligor10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuptaNR10, author = {Kapil Kumar Gupta and Baikunth Nath and Kotagiri Ramamohanarao}, title = {Layered Approach Using Conditional Random Fields for Intrusion Detection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {1}, pages = {35--49}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.20}, doi = {10.1109/TDSC.2008.20}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GuptaNR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HanQ10, author = {Mi Kyung Han and Lili Qiu}, title = {Greedy Receivers in {IEEE} 802.11 Hotspots: Impacts and Detection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {4}, pages = {410--423}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2010.2}, doi = {10.1109/TDSC.2010.2}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HanQ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KinderKSV10, author = {Johannes Kinder and Stefan Katzenbeisser and Christian Schallhart and Helmut Veith}, title = {Proactive Detection of Computer Worms Using Model Checking}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {4}, pages = {424--438}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.74}, doi = {10.1109/TDSC.2008.74}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KinderKSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KompellaYGS10, author = {Ramana Rao Kompella and Jennifer Yates and Albert G. Greenberg and Alex C. Snoeren}, title = {Fault Localization via Risk Modeling}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {4}, pages = {396--409}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2009.37}, doi = {10.1109/TDSC.2009.37}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KompellaYGS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KongJCCH10, author = {Joonho Kong and Johnsy K. John and Eui{-}Young Chung and Sung Woo Chung and Jie S. Hu}, title = {On the Thermal Attack in Instruction Caches}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {2}, pages = {217--223}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2009.16}, doi = {10.1109/TDSC.2009.16}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KongJCCH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaHA10, author = {Tiejun Ma and Jane Hillston and Stuart Anderson}, title = {On the Quality of Service of Crash-Recovery Failure Detectors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {3}, pages = {271--283}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2009.35}, doi = {10.1109/TDSC.2009.35}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MaHA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaggiMZ10, author = {Federico Maggi and Matteo Matteucci and Stefano Zanero}, title = {Detecting Intrusions through System Call Sequence and Argument Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {4}, pages = {381--395}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.69}, doi = {10.1109/TDSC.2008.69}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MaggiMZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MasoodGM10, author = {Ammar Masood and Arif Ghafoor and Aditya P. Mathur}, title = {Conformance Testing of Temporal Role-Based Access Control Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {2}, pages = {144--158}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.41}, doi = {10.1109/TDSC.2008.41}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MasoodGM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MittalN10, author = {Neeraj Mittal and Ramon Novales}, title = {Cluster-Based Key Predistribution Using Deployment Knowledge}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {3}, pages = {329--335}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2009.34}, doi = {10.1109/TDSC.2009.34}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MittalN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NicopoulosSYPNDI10, author = {Chrysostomos Nicopoulos and Suresh Srinivasan and Aditya Yanamandra and Dongkook Park and Vijaykrishnan Narayanan and Chita R. Das and Mary Jane Irwin}, title = {On the Effects of Process Variation in Network-on-Chip Architectures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {3}, pages = {240--254}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.59}, doi = {10.1109/TDSC.2008.59}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/NicopoulosSYPNDI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PeterWC10, author = {Steffen Peter and Dirk Westhoff and Claude Castelluccia}, title = {A Survey on the Encryption of Convergecast Traffic with In-Network Processing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {1}, pages = {20--34}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.23}, doi = {10.1109/TDSC.2008.23}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PeterWC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Redinbo10, author = {G. Robert Redinbo}, title = {Wavelet Codes for Algorithm-Based Fault Tolerance Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {3}, pages = {315--328}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2009.14}, doi = {10.1109/TDSC.2009.14}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Redinbo10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RileyJX10, author = {Ryan Riley and Xuxian Jiang and Dongyan Xu}, title = {An Architectural Approach to Preventing Code Injection Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {4}, pages = {351--365}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2010.1}, doi = {10.1109/TDSC.2010.1}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RileyJX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Sandhu10, author = {Ravi S. Sandhu}, title = {Editorial}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {1}, pages = {4}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2010.8}, doi = {10.1109/TDSC.2010.8}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Sandhu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Sandhu10a, author = {Ravi S. Sandhu}, title = {Editorial}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {3}, pages = {225}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2010.32}, doi = {10.1109/TDSC.2010.32}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Sandhu10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SchroederG10, author = {Bianca Schroeder and Garth A. Gibson}, title = {A Large-Scale Study of Failures in High-Performance Computing Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {4}, pages = {337--351}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2009.4}, doi = {10.1109/TDSC.2009.4}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SchroederG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SheuHL10, author = {Tzu{-}Fang Sheu and Nen{-}Fu Huang and Hsiao Ping Lee}, title = {In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {2}, pages = {175--188}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.57}, doi = {10.1109/TDSC.2008.57}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SheuHL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TimorMBS10, author = {Avi Timor and Avi Mendelson and Yitzhak Birk and Neeraj Suri}, title = {Using Underutilized {CPU} Resources to Enhance Its Reliability}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {1}, pages = {94--109}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.31}, doi = {10.1109/TDSC.2008.31}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/TimorMBS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TuLYTK10, author = {Manghui Tu and Peng Li and I{-}Ling Yen and Bhavani M. Thuraisingham and Latifur Khan}, title = {Secure Data Objects Replication in Data Grid}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {1}, pages = {50--64}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.19}, doi = {10.1109/TDSC.2008.19}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TuLYTK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/VaidyaAWG10, author = {Jaideep Vaidya and Vijayalakshmi Atluri and Janice Warner and Qi Guo}, title = {Role Engineering via Prioritized Subset Enumeration}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {3}, pages = {300--314}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.61}, doi = {10.1109/TDSC.2008.61}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/VaidyaAWG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangPLZ10, author = {Xinran Wang and Chi{-}Chun Pan and Peng Liu and Sencun Zhu}, title = {SigFree: {A} Signature-Free Buffer Overflow Attack Blocker}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {1}, pages = {65--79}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.30}, doi = {10.1109/TDSC.2008.30}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangPLZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangR10, author = {XiaoFeng Wang and Michael K. Reiter}, title = {Using Web-Referral Architectures to Mitigate Denial-of-Service Threats}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {2}, pages = {203--216}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.56}, doi = {10.1109/TDSC.2008.56}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangSZ10, author = {Ping Wang and Sherri Sparks and Cliff Changchun Zou}, title = {An Advanced Hybrid Peer-to-Peer Botnet}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {2}, pages = {113--127}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.35}, doi = {10.1109/TDSC.2008.35}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangSZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XingW10, author = {Fei Xing and Wenye Wang}, title = {On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {3}, pages = {284--299}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.71}, doi = {10.1109/TDSC.2008.71}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XingW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YangLDB10, author = {Yanjiang Yang and Yingjiu Li and Robert H. Deng and Feng Bao}, title = {Shifting Inference Control to User Side: Architecture and Protocol}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {2}, pages = {189--202}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.70}, doi = {10.1109/TDSC.2008.70}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YangLDB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CaoBL09, author = {Tianjie Cao and Elisa Bertino and Hong Lei}, title = {Security Analysis of the {SASI} Protocol}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {1}, pages = {73--77}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2008.32}, doi = {10.1109/TDSC.2008.32}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CaoBL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CarbunarIN09, author = {Bogdan Carbunar and Ioannis Ioannidis and Cristina Nita{-}Rotaru}, title = {{JANUS:} {A} Framework for Scalable and Secure Routing in Hybrid Wireless Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {4}, pages = {295--308}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2008.14}, doi = {10.1109/TDSC.2008.14}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CarbunarIN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DistefanoP09, author = {Salvatore Distefano and Antonio Puliafito}, title = {Dependability Evaluation with Dynamic Reliability Block Diagrams and Dynamic Fault Trees}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {1}, pages = {4--17}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2007.70242}, doi = {10.1109/TDSC.2007.70242}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DistefanoP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Dominguez-OviedoH09, author = {Agustin Dominguez{-}Oviedo and M. Anwar Hasan}, title = {Error Detection and Fault Tolerance in {ECSM} Using Input Randomization}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {3}, pages = {175--187}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2008.21}, doi = {10.1109/TDSC.2008.21}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Dominguez-OviedoH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ErginUVG09, author = {Oguz Ergin and Osman S. Unsal and Xavier Vera and Antonio Gonz{\'{a}}lez}, title = {Reducing Soft Errors through Operand Width Aware Policies}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {3}, pages = {217--230}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2008.18}, doi = {10.1109/TDSC.2008.18}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ErginUVG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GaoRS09, author = {Debin Gao and Michael K. Reiter and Dawn Xiaodong Song}, title = {Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {2}, pages = {96--110}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2008.39}, doi = {10.1109/TDSC.2008.39}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GaoRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GiraultK09, author = {Alain Girault and Hamoudi Kalla}, title = {A Novel Bicriteria Scheduling Heuristics Providing a Guaranteed Global System Failure Rate}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {4}, pages = {241--254}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2008.50}, doi = {10.1109/TDSC.2008.50}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GiraultK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Gizopoulos09, author = {Dimitris Gizopoulos}, title = {Online Periodic Self-Test Scheduling for Real-Time Processor-Based Systems Dependability Enhancement}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {2}, pages = {152--158}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2009.12}, doi = {10.1109/TDSC.2009.12}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Gizopoulos09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuLLC09, author = {Qijun Gu and Peng Liu and Wang{-}Chien Lee and Chao{-}Hsien Chu}, title = {{KTR:} An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {3}, pages = {188--201}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2008.12}, doi = {10.1109/TDSC.2008.12}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GuLLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HutleMSZ09, author = {Martin Hutle and Dahlia Malkhi and Ulrich Schmid and Lidong Zhou}, title = {Chasing the Weakest System Model for Implementing {\(\Omega\)} and Consensus}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {4}, pages = {269--281}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2008.24}, doi = {10.1109/TDSC.2008.24}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HutleMSZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JafarKG09, author = {Samir Jafar and Axel W. Krings and Thierry Gautier}, title = {Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {1}, pages = {32--44}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2008.17}, doi = {10.1109/TDSC.2008.17}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JafarKG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KunduPSM09, author = {Amlan Kundu and Suvasini Panigrahi and Shamik Sural and Arun K. Majumdar}, title = {{BLAST-SSAHA} Hybridization for Credit Card Fraud Detection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {4}, pages = {309--315}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2009.11}, doi = {10.1109/TDSC.2009.11}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KunduPSM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaxinoK09, author = {T. C. Maxino and P. J. Koopman}, title = {The Effectiveness of Checksums for Embedded Control Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {1}, pages = {59--72}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2007.70216}, doi = {10.1109/TDSC.2007.70216}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MaxinoK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MeixnerS09, author = {Albert Meixner and Daniel J. Sorin}, title = {Dynamic Verification of Memory Consistency in Cache-Coherent Multithreaded Computer Architectures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {1}, pages = {18--31}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2007.70243}, doi = {10.1109/TDSC.2007.70243}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MeixnerS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MichailKMG09, author = {Harris E. Michail and Athanasios Kakarountas and Athanasios Milidonis and Costas E. Goutis}, title = {A Top-Down Design Methodology for Ultrahigh-Performance Hashing Cores}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {4}, pages = {255--268}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2008.15}, doi = {10.1109/TDSC.2008.15}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MichailKMG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MirkovicHFRT09, author = {Jelena Mirkovic and Alefiya Hussain and Sonia Fahmy and Peter L. Reiher and Roshan K. Thomas}, title = {Accurately Measuring Denial of Service in Simulation and Testbed Experiments}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {2}, pages = {81--95}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2008.73}, doi = {10.1109/TDSC.2008.73}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MirkovicHFRT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Phan09, author = {Raphael C.{-}W. Phan}, title = {Cryptanalysis of a New Ultralightweight {RFID} Authentication Protocol{\textemdash}SASI}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {4}, pages = {316--320}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2008.33}, doi = {10.1109/TDSC.2008.33}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Phan09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PomeranzR09, author = {Irith Pomeranz and Sudhakar M. Reddy}, title = {Semiconcurrent Online Testing of Transition Faults through Output Response Comparison of Identical Circuits}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {3}, pages = {231--240}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2008.34}, doi = {10.1109/TDSC.2008.34}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PomeranzR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RahbaranS09, author = {Babak Rahbaran and Andreas Steininger}, title = {Is Asynchronous Logic More Robust Than Synchronous Logic?}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {4}, pages = {282--294}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2008.37}, doi = {10.1109/TDSC.2008.37}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RahbaranS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RamanarayananDRKNXIU09, author = {Rajaraman Ramanarayanan and Vijay Degalahal and Krishnan Ramakrishnan and Jungsub Kim and Vijaykrishnan Narayanan and Yuan Xie and Mary Jane Irwin and Kenan Unlu}, title = {Modeling Soft Errors at the Device and Logic Levels for Combinational Circuits}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {3}, pages = {202--216}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2007.70231}, doi = {10.1109/TDSC.2007.70231}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RamanarayananDRKNXIU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SaidaneND09, author = {Ayda Sa{\"{\i}}dane and Vincent Nicomette and Yves Deswarte}, title = {The Design of a Generic Intrusion-Tolerant Architecture for Web Servers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {1}, pages = {45--58}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2008.1}, doi = {10.1109/TDSC.2008.1}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SaidaneND09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShyeBMRC09, author = {Alex Shye and Joseph Blomstedt and Tipp Moseley and Vijay Janapa Reddi and Daniel A. Connors}, title = {{PLR:} {A} Software Approach to Transient Fault Tolerance for Multicore Architectures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {2}, pages = {135--148}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2008.62}, doi = {10.1109/TDSC.2008.62}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShyeBMRC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SunWC09, author = {Hung{-}Min Sun and King{-}Hang Wang and Chien{-}Ming Chen}, title = {On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {2}, pages = {159--160}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2009.15}, doi = {10.1109/TDSC.2009.15}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SunWC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TagueSRP09, author = {Patrick Tague and David Slater and Jason Rogers and Radha Poovendran}, title = {Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {2}, pages = {111--123}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2008.60}, doi = {10.1109/TDSC.2008.60}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TagueSRP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangZS09, author = {Huaqun Wang and Futai Zhang and Yanfei Sun}, title = {Cryptanalysis of a Generalized Ring Signature Scheme}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {2}, pages = {149--151}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2009.13}, doi = {10.1109/TDSC.2009.13}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangZS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XenoulisGPP09, author = {George Xenoulis and Dimitris Gizopoulos and Mihalis Psarakis and Antonis M. Paschalis}, title = {Instruction-Based Online Periodic Self-Testing of Microprocessors with Floating-Point Units}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {2}, pages = {124--134}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2008.68}, doi = {10.1109/TDSC.2008.68}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/XenoulisGPP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XingD09, author = {Liudong Xing and Yuanshun Dai}, title = {A New Decision-Diagram-Based Method for Efficient Analysis on Multistate Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {3}, pages = {161--174}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2007.70244}, doi = {10.1109/TDSC.2007.70244}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XingD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BertinoSW08, author = {Elisa Bertino and Ning Shang and Samuel S. Wagstaff Jr.}, title = {An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {2}, pages = {65--70}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2007.70241}, doi = {10.1109/TDSC.2007.70241}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BertinoSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Blanchet08, author = {Bruno Blanchet}, title = {A Computationally Sound Mechanized Prover for Security Protocols}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {4}, pages = {193--207}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2007.1005}, doi = {10.1109/TDSC.2007.1005}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Blanchet08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BrumleyNSWJ08, author = {David Brumley and James Newsome and Dawn Song and Hao Wang and Somesh Jha}, title = {Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {4}, pages = {224--241}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2008.55}, doi = {10.1109/TDSC.2008.55}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BrumleyNSWJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CapkunCRTHS08, author = {Srdjan Capkun and Mario Cagalj and Ram Kumar Rengaswamy and Ilias Tsigkogiannis and Jean{-}Pierre Hubaux and Mani B. Srivastava}, title = {Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {4}, pages = {208--223}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2008.11}, doi = {10.1109/TDSC.2008.11}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CapkunCRTHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DengH08, author = {Jing Deng and Yunghsiang S. Han}, title = {Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {3}, pages = {177--190}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2007.70233}, doi = {10.1109/TDSC.2007.70233}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DengH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DuanYC08, author = {Zhenhai Duan and Xin Yuan and Jaideep Chandrashekar}, title = {Controlling {IP} Spoofing through Interdomain Packet Filters}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {1}, pages = {22--36}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2007.70224}, doi = {10.1109/TDSC.2007.70224}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DuanYC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HalkidisTCS08, author = {Spyros T. Halkidis and Nikolaos Tsantalis and Alexander Chatzigeorgiou and George Stephanides}, title = {Architectural Risk Analysis of Software Systems Based on Security Patterns}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {3}, pages = {129--142}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2007.70240}, doi = {10.1109/TDSC.2007.70240}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HalkidisTCS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JhaLTWW08, author = {Somesh Jha and Ninghui Li and Mahesh V. Tripunitara and Qihua Wang and William H. Winsborough}, title = {Towards Formal Verification of Role-Based Access Control Policies}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {4}, pages = {242--255}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2007.70225}, doi = {10.1109/TDSC.2007.70225}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JhaLTWW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LuL08, author = {Haibing Lu and Yingjiu Li}, title = {Practical Inference Control for Data Cubes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {2}, pages = {87--98}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2007.70217}, doi = {10.1109/TDSC.2007.70217}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LuL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MenichelliMOT08, author = {Francesco Menichelli and Renato Menicocci and Mauro Olivieri and Alessandro Trifiletti}, title = {High-Level Side-Channel Attack Modeling and Simulation for Security-Critical Systems on Chips}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {3}, pages = {164--176}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2007.70234}, doi = {10.1109/TDSC.2007.70234}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MenichelliMOT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Obermaisser08, author = {Roman Obermaisser}, title = {Temporal Partitioning of Communication Resources in an Integrated Architecture}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {2}, pages = {99--114}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2007.70232}, doi = {10.1109/TDSC.2007.70232}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Obermaisser08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ParkNL08, author = {Jong{-}Tae Park and Jae{-}Wook Nah and Wee{-}Hyuk Lee}, title = {Dynamic Path Management with Resilience Constraints under Multiple Link Failures in {MPLS/GMPLS} Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {3}, pages = {143--154}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2008.16}, doi = {10.1109/TDSC.2008.16}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ParkNL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Ramkumar08, author = {Mahalingam Ramkumar}, title = {Trustworthy Computing under Resource Constraints with the {DOWN} Policy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {1}, pages = {49--61}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2007.70227}, doi = {10.1109/TDSC.2007.70227}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Ramkumar08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RenH08, author = {Jian Ren and Lein Harn}, title = {Generalized Ring Signatures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {3}, pages = {155--163}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2008.22}, doi = {10.1109/TDSC.2008.22}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RenH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SellkeSB08, author = {Sarah H. Sellke and Ness B. Shroff and Saurabh Bagchi}, title = {Modeling and Automated Containment of Worms}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {2}, pages = {71--86}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2007.70230}, doi = {10.1109/TDSC.2007.70230}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SellkeSB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SrinivasanKMXNIS08, author = {Suresh Srinivasan and Krishnan Ramakrishnan and Prasanth Mangalagiri and Yuan Xie and Vijaykrishnan Narayanan and Mary Jane Irwin and Karthik Sarpatwari}, title = {Toward Increasing {FPGA} Lifetime}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {2}, pages = {115--127}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2007.70235}, doi = {10.1109/TDSC.2007.70235}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SrinivasanKMXNIS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SrivastavaKSM08, author = {Abhinav Srivastava and Amlan Kundu and Shamik Sural and Arun K. Majumdar}, title = {Credit Card Fraud Detection Using Hidden Markov Model}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {1}, pages = {37--48}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2007.70228}, doi = {10.1109/TDSC.2007.70228}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SrivastavaKSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WongWL08, author = {T. Y. Wong and Man Hon Wong and John C. S. Lui}, title = {A Precise Termination Condition of the Probabilistic Packet Marking Algorithm}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {1}, pages = {6--21}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2007.70229}, doi = {10.1109/TDSC.2007.70229}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WongWL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AhmedT07, author = {Ahmed Awad E. Ahmed and Issa Traor{\'{e}}}, title = {A New Biometric Technology Based on Mouse Dynamics}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {3}, pages = {165--179}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70207}, doi = {10.1109/TDSC.2007.70207}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AhmedT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AwerbuchKMPV07, author = {Baruch Awerbuch and Shay Kutten and Yishay Mansour and Boaz Patt{-}Shamir and George Varghese}, title = {A Time-Optimal Self-Stabilizing Synchronizer Using {A} Phase Clock}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {3}, pages = {180--190}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.1007}, doi = {10.1109/TDSC.2007.1007}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AwerbuchKMPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BadishiHK07, author = {Gal Badishi and Amir Herzberg and Idit Keidar}, title = {Keeping Denial-of-Service Attackers in the Dark}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {3}, pages = {191--204}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70209}, doi = {10.1109/TDSC.2007.70209}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BadishiHK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BouabdallahS07, author = {Nizar Bouabdallah and Bruno Sericola}, title = {Introducing a Relative Priority for the Shared-Protection Schemes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {3}, pages = {205--215}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.1008}, doi = {10.1109/TDSC.2007.1008}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BouabdallahS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BucciGLT07, author = {Marco Bucci and Luca Giancane and Raimondo Luzzi and Alessandro Trifiletti}, title = {A Dynamic and Differential {CMOS} Lookup Table with Data-Independent Power Consumption for Cryptographic Applications on Chip Cards}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {4}, pages = {245--251}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70212}, doi = {10.1109/TDSC.2007.70212}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BucciGLT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CaiHPP07, author = {Min Cai and Kai Hwang and Jianping Pan and Christos Papadopoulos}, title = {WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {2}, pages = {88--104}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.1000}, doi = {10.1109/TDSC.2007.1000}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CaiHPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CervesatoM07, author = {Iliano Cervesato and Catherine A. Meadows}, title = {One Picture Is Worth a Dozen Connectives: {A} Fault-Tree Representation of {NPATRL} Security Requirements}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {3}, pages = {216--227}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70206}, doi = {10.1109/TDSC.2007.70206}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CervesatoM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Chien07, author = {Hung{-}Yu Chien}, title = {{SASI:} {A} New Ultralightweight {RFID} Authentication Protocol Providing Strong Authentication and Strong Integrity}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {4}, pages = {337--340}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70226}, doi = {10.1109/TDSC.2007.70226}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Chien07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DantuCP07, author = {Ram Dantu and Jo{\~{a}}o W. Cangussu and Sudeep Patwardhan}, title = {Fast Worm Containment Using Feedback Control}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {2}, pages = {119--136}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.1002}, doi = {10.1109/TDSC.2007.1002}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DantuCP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GashiPS07, author = {Ilir Gashi and Peter T. Popov and Lorenzo Strigini}, title = {Fault Tolerance via Diversity for Off-the-Shelf Products: {A} Study with {SQL} Database Servers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {4}, pages = {280--294}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70208}, doi = {10.1109/TDSC.2007.70208}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GashiPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Gokhale07, author = {Swapna S. Gokhale}, title = {Architecture-Based Software Reliability Analysis: Overview and Limitations}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {1}, pages = {32--40}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.4}, doi = {10.1109/TDSC.2007.4}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Gokhale07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GorenderMR07, author = {S{\'{e}}rgio Gorender and Raimundo Jos{\'{e}} de Ara{\'{u}}jo Mac{\^{e}}do and Michel Raynal}, title = {An Adaptive Programming Model for Fault-Tolerant Distributed Computing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {1}, pages = {18--31}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.3}, doi = {10.1109/TDSC.2007.3}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GorenderMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HaleemMCS07, author = {Mohamed A. Haleem and Chetan Nanjunda Mathur and Rajarathnam Chandramouli and K. P. Subbalakshmi}, title = {Opportunistic Encryption: {A} Trade-Off between Security and Throughput in Wireless Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {4}, pages = {313--324}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70214}, doi = {10.1109/TDSC.2007.70214}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HaleemMCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HwangCCQ07, author = {Kai Hwang and Min Cai and Ying Chen and Min Qin}, title = {Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {1}, pages = {41--55}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.9}, doi = {10.1109/TDSC.2007.9}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HwangCCQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HwangLL07, author = {Tzonelih Hwang and Kuo{-}Chang Lee and Chuan{-}Ming Li}, title = {Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {1}, pages = {71--80}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.13}, doi = {10.1109/TDSC.2007.13}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HwangLL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Iyer07, author = {Ravishankar K. Iyer}, title = {Editorial: Dependability and Security}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {2}, pages = {85--87}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.070201}, doi = {10.1109/TDSC.2007.070201}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Iyer07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KhannaCVBCV07, author = {Gunjan Khanna and Mike Yu Cheng and Padma Varadharajan and Saurabh Bagchi and Miguel P. Correia and Paulo Ver{\'{\i}}ssimo}, title = {Automated Rule-Based Diagnosis through a Distributed Monitor System}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {4}, pages = {266--279}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70211}, doi = {10.1109/TDSC.2007.70211}, timestamp = {Tue, 06 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KhannaCVBCV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LeeTPP07, author = {Jeremy Lee and Mohammad Tehranipoor and Chintan Patel and Jim Plusquellic}, title = {Securing Designs against Scan-Based Side-Channel Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {4}, pages = {325--336}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70215}, doi = {10.1109/TDSC.2007.70215}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LeeTPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PeisertBKM07, author = {Sean Peisert and Matt Bishop and Sidney Karin and Keith Marzullo}, title = {Analysis of Computer Intrusions Using Sequences of Function Calls}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {2}, pages = {137--150}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.1003}, doi = {10.1109/TDSC.2007.1003}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PeisertBKM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RamasamyAS07, author = {HariGovind V. Ramasamy and Adnan Agbaria and William H. Sanders}, title = {A Parsimonious Approach for Obtaining Resource-Efficient and Trustworthy Execution}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {1}, pages = {1--17}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.2}, doi = {10.1109/TDSC.2007.2}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RamasamyAS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ReayBDM07, author = {Ian Reay and Patricia Beatty and Scott Dick and James Miller}, title = {A Survey and Analysis of the {P3P} Protocol's Agents, Adoption, Maintenance, and Future}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {2}, pages = {151--164}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.1004}, doi = {10.1109/TDSC.2007.1004}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ReayBDM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ScherrerLOBA07, author = {Antoine Scherrer and Nicolas Larrieu and Philippe Owezarski and Pierre Borgnat and Patrice Abry}, title = {Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {1}, pages = {56--70}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.12}, doi = {10.1109/TDSC.2007.12}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ScherrerLOBA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SerafiniBS07, author = {Marco Serafini and Andrea Bondavalli and Neeraj Suri}, title = {Online Diagnosis and Recovery: On the Choice and Impact of Tuning Parameters}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {4}, pages = {295--312}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70210}, doi = {10.1109/TDSC.2007.70210}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/SerafiniBS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WuB07, author = {Xiaoxin Wu and Elisa Bertino}, title = {An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {4}, pages = {252--265}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70213}, doi = {10.1109/TDSC.2007.70213}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WuB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YuSL07, author = {Wei Yu and Yan Sun and K. J. Ray Liu}, title = {Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {3}, pages = {228--242}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.1006}, doi = {10.1109/TDSC.2007.1006}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YuSL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZouTG07, author = {Cliff Changchun Zou and Donald F. Towsley and Weibo Gong}, title = {Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {2}, pages = {105--118}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.1001}, doi = {10.1109/TDSC.2007.1001}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZouTG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ArlatBHV06, author = {Jean Arlat and Andrea Bondavalli and Boudewijn R. Haverkort and Paulo Ver{\'{\i}}ssimo}, title = {Guest Editorial for the Special Issue on the 2005 {IEEE/IFIP} Conference on Dependable Systems and Networks, including the Dependable Computing and Communications and Performance and Dependability Symposia}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {3}, pages = {169--171}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.36}, doi = {10.1109/TDSC.2006.36}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ArlatBHV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BadishiKS06, author = {Gal Badishi and Idit Keidar and Amir Sasson}, title = {Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based Multicast}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {1}, pages = {45--61}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.12}, doi = {10.1109/TDSC.2006.12}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BadishiKS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BakerP06, author = {Zachary K. Baker and Viktor K. Prasanna}, title = {Automatic Synthesis of Efficient Intrusion Detection Systems on FPGAs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {289--300}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.44}, doi = {10.1109/TDSC.2006.44}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BakerP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CiaramellaDSGT06, author = {Angelo Ciaramella and Paolo D'Arco and Alfredo De Santis and Clemente Galdi and Roberto Tagliaferri}, title = {Neural Network Techniques for Proactive Password Checking}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {327--339}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.53}, doi = {10.1109/TDSC.2006.53}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CiaramellaDSGT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DuDHV06, author = {Wenliang Du and Jing Deng and Yunghsiang S. Han and Pramod K. Varshney}, title = {A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {1}, pages = {62--77}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.2}, doi = {10.1109/TDSC.2006.2}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DuDHV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FuWD06, author = {Anthony Y. Fu and Liu Wenyin and Xiaotie Deng}, title = {Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance {(EMD)}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {301--311}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.50}, doi = {10.1109/TDSC.2006.50}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FuWD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HanWJ06, author = {Junghee Han and David Watson and Farnam Jahanian}, title = {An Experimental Study of Internet Path Diversity}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {273--288}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.43}, doi = {10.1109/TDSC.2006.43}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HanWJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Iyer06, author = {Ravishankar K. Iyer}, title = {Editorial: Dependability and Security--Looking Foward to 2006}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {1}, pages = {1}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.11}, doi = {10.1109/TDSC.2006.11}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Iyer06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JiangCY06, author = {Guofei Jiang and Haifeng Chen and Kenji Yoshihira}, title = {Modeling and Tracking of Transaction Flow Dynamics for Fault Detection in Complex Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {312--326}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.52}, doi = {10.1109/TDSC.2006.52}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JiangCY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KemperMT06, author = {Peter Kemper and Dennis M{\"{u}}ller and Axel Th{\"{u}}mmler}, title = {Combining Response Surface Methodology with Numerical Methods for Optimization of Markovian Models}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {3}, pages = {259--269}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.28}, doi = {10.1109/TDSC.2006.28}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KemperMT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KhannaVB06, author = {Gunjan Khanna and Padma Varadharajan and Saurabh Bagchi}, title = {Automated Online Monitoring of Distributed Applications through External Monitors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {2}, pages = {115--129}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.17}, doi = {10.1109/TDSC.2006.17}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KhannaVB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KimLCC06, author = {Yoohwan Kim and Wing Cheong Lau and Mooi Choo Chuah and H. Jonathan Chao}, title = {PacketScore: {A} Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {2}, pages = {141--155}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.25}, doi = {10.1109/TDSC.2006.25}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KimLCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiL06, author = {Jiangtao Li and Ninghui Li}, title = {OACerts: Oblivious Attribute Certificates}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {340--352}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.54}, doi = {10.1109/TDSC.2006.54}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MartinA06, author = {Jean{-}Philippe Martin and Lorenzo Alvisi}, title = {Fast Byzantine Consensus}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {3}, pages = {202--215}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.35}, doi = {10.1109/TDSC.2006.35}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MartinA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MartinA06a, author = {Jean{-}Philippe Martin and Lorenzo Alvisi}, title = {Correction to "Fast Byzantine Consensus"}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {400}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.45}, doi = {10.1109/TDSC.2006.45}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MartinA06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MizrakCMS06, author = {Alper Tugay Mizrak and Yuchung Cheng and Keith Marzullo and Stefan Savage}, title = {Detecting and Isolating Malicious Routers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {3}, pages = {230--244}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.34}, doi = {10.1109/TDSC.2006.34}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MizrakCMS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NebenzahlSW06, author = {Danny Nebenzahl and Shmuel Sagiv and Avishai Wool}, title = {Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {1}, pages = {78--90}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.14}, doi = {10.1109/TDSC.2006.14}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/NebenzahlSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/OzakiDOK06, author = {Tatsuya Ozaki and Tadashi Dohi and Hiroyuki Okamura and Naoto Kaio}, title = {Distribution-Free Checkpoint Placement Algorithms Based on Min-Max Principle}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {2}, pages = {130--140}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.22}, doi = {10.1109/TDSC.2006.22}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/OzakiDOK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PereiraMC06, author = {Anil L. Pereira and Vineela Muppavarapu and Soon Myoung Chung}, title = {Role-Based Access Control for Grid Database Services Using the Community Authorization Service}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {2}, pages = {156--166}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.26}, doi = {10.1109/TDSC.2006.26}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PereiraMC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PiromsopaE06, author = {Krerk Piromsopa and Richard J. Enbody}, title = {Secure Bit: Transparent, Hardware Buffer-Overflow Protection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {365--376}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.56}, doi = {10.1109/TDSC.2006.56}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/PiromsopaE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RajagopalanHJS06, author = {Mohan Rajagopalan and Matti A. Hiltunen and Trevor Jim and Richard D. Schlichting}, title = {System Call Monitoring Using Authenticated System Calls}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {3}, pages = {216--229}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.41}, doi = {10.1109/TDSC.2006.41}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RajagopalanHJS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SchiperT06, author = {Andr{\'{e}} Schiper and Sam Toueg}, title = {From Set Membership to Group Membership: {A} Separation of Concerns}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {1}, pages = {2--12}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.13}, doi = {10.1109/TDSC.2006.13}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SchiperT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SquicciariniBFR06, author = {Anna Cinzia Squicciarini and Elisa Bertino and Elena Ferrari and Indrakshi Ray}, title = {Achieving Privacy in Trust Negotiations with an Ontology-Based Approach}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {1}, pages = {13--30}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.3}, doi = {10.1109/TDSC.2006.3}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SquicciariniBFR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SridharanATK06, author = {Vilas Sridharan and Hossein Asadi and Mehdi Baradaran Tahoori and David R. Kaeli}, title = {Reducing Data Cache Susceptibility to Soft Errors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {353--364}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.55}, doi = {10.1109/TDSC.2006.55}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SridharanATK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/StrunkK06, author = {Elisabeth A. Strunk and John C. Knight}, title = {Dependability through Assured Reconfiguration in Embedded System Software}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {3}, pages = {172--187}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.33}, doi = {10.1109/TDSC.2006.33}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/StrunkK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ThummlerBT06, author = {Axel Th{\"{u}}mmler and Peter Buchholz and Mikl{\'{o}}s Telek}, title = {A Novel Approach for Phase-Type Fitting with the {EM} Algorithm}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {3}, pages = {245--258}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.27}, doi = {10.1109/TDSC.2006.27}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ThummlerBT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/VoraN06, author = {Adnan Vora and Mikhail Nesterenko}, title = {Secure Location Verification Using Radio Broadcast}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {377--385}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.57}, doi = {10.1109/TDSC.2006.57}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/VoraN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangL06, author = {Shyh{-}Yih Wang and Chi{-}Sung Laih}, title = {Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {1}, pages = {91--100}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.15}, doi = {10.1109/TDSC.2006.15}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangP06, author = {Nicholas J. Wang and Sanjay J. Patel}, title = {ReStore: Symptom-Based Soft Error Detection in Microprocessors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {3}, pages = {188--201}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.40}, doi = {10.1109/TDSC.2006.40}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XinidisCAAM06, author = {Konstantinos Xinidis and Ioannis Charitakis and Spyros Antonatos and Kostas G. Anagnostakis and Evangelos P. Markatos}, title = {An Active Splitter Architecture for Intrusion Detection and Prevention}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {1}, pages = {31--44}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.6}, doi = {10.1109/TDSC.2006.6}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XinidisCAAM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YangDB06, author = {Yanjiang Yang and Robert H. Deng and Feng Bao}, title = {A Practical Password-Based Two-Server Authentication and Key Exchange System}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {2}, pages = {105--114}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.16}, doi = {10.1109/TDSC.2006.16}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YangDB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangLLF06, author = {Yanchao Zhang and Wei Liu and Wenjing Lou and Yuguang Fang}, title = {Securing Mobile Ad Hoc Networks with Certificateless Public Keys}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {386--399}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.58}, doi = {10.1109/TDSC.2006.58}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangLLF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AmirNST05, author = {Yair Amir and Cristina Nita{-}Rotaru and Jonathan Robert Stanton and Gene Tsudik}, title = {Secure Spread: An Integrated Architecture for Secure Group Communication}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {3}, pages = {248--261}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.39}, doi = {10.1109/TDSC.2005.39}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AmirNST05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BackesP05, author = {Michael Backes and Birgit Pfitzmann}, title = {Relating Symbolic and Cryptographic Secrecy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {2}, pages = {109--123}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.25}, doi = {10.1109/TDSC.2005.25}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BackesP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BertaBV05, author = {Istv{\'{a}}n Zsolt Berta and Levente Butty{\'{a}}n and Istv{\'{a}}n Vajda}, title = {A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {3}, pages = {268--272}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.28}, doi = {10.1109/TDSC.2005.28}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BertaBV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BertinoS05, author = {Elisa Bertino and Ravi S. Sandhu}, title = {Database Security-Concepts, Approaches, and Challenges}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {1}, pages = {2--19}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.9}, doi = {10.1109/TDSC.2005.9}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BertinoS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BowerOS05, author = {Fred A. Bower and Sule Ozev and Daniel J. Sorin}, title = {Autonomic Microprocessor Execution via Self-Repairing Arrays}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {4}, pages = {297--310}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.44}, doi = {10.1109/TDSC.2005.44}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BowerOS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChanGPM05, author = {Haowen Chan and Virgil D. Gligor and Adrian Perrig and Gautam Muralidharan}, title = {On the Distribution and Revocation of Cryptographic Keys in Sensor Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {3}, pages = {233--247}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.37}, doi = {10.1109/TDSC.2005.37}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChanGPM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChangAK05, author = {Yung{-}Ruei Chang and Suprasad V. Amari and Sy{-}Yen Kuo}, title = {OBDD-Based Evaluation of Reliability and Importance Measures for Multistate Systems Subject to Imperfect Fault Coverage}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {4}, pages = {336--347}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.51}, doi = {10.1109/TDSC.2005.51}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChangAK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/EzhilchelvanS05, author = {Paul D. Ezhilchelvan and Santosh K. Shrivastava}, title = {A Family of Trusted Third Party Based Fair-Exchange Protocols}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {4}, pages = {273--286}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.40}, doi = {10.1109/TDSC.2005.40}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/EzhilchelvanS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FriedmanMR05, author = {Roy Friedman and Achour Most{\'{e}}faoui and Michel Raynal}, title = {Simple and Efficient Oracle-Based Consensus Protocols for Asynchronous Byzantine Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {1}, pages = {46--56}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.13}, doi = {10.1109/TDSC.2005.13}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FriedmanMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HeZY05, author = {Xubin He and Ming Zhang and Qing Yang}, title = {{SPEK:} {A} Storage Performance Evaluation Kernel Module for Block-Level Storage Systems under Faulty Conditions}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {2}, pages = {138--149}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.27}, doi = {10.1109/TDSC.2005.27}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HeZY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Iyer05, author = {Ravishankar K. Iyer}, title = {Editorial: State of the Journal Address}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {1}, pages = {1}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.10}, doi = {10.1109/TDSC.2005.10}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Iyer05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JoshiBG05, author = {James Joshi and Elisa Bertino and Arif Ghafoor}, title = {An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {2}, pages = {157--175}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.18}, doi = {10.1109/TDSC.2005.18}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JoshiBG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KohnoBC05, author = {Tadayoshi Kohno and Andre Broido and Kimberly C. Claffy}, title = {Remote Physical Device Fingerprintin}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {2}, pages = {93--108}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.26}, doi = {10.1109/TDSC.2005.26}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KohnoBC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KulkarniE05, author = {Sandeep S. Kulkarni and Ali Ebnenasir}, title = {Complexity Issues in Automated Synthesis of Failsafe Fault-Tolerance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {3}, pages = {201--215}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.29}, doi = {10.1109/TDSC.2005.29}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KulkarniE05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KulkarniE05a, author = {Sandeep S. Kulkarni and Ali Ebnenasir}, title = {The Effect of the Specification Model on the Complexity of Adding Masking Fault Tolerance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {4}, pages = {348--355}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.52}, doi = {10.1109/TDSC.2005.52}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KulkarniE05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiSJ05, author = {Yingjiu Li and Vipin Swarup and Sushil Jajodia}, title = {Fingerprinting Relational Databases: Schemes and Specialties}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {1}, pages = {34--45}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.12}, doi = {10.1109/TDSC.2005.12}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiSJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LuoHE05, author = {Jun Luo and Jean{-}Pierre Hubaux and Patrick Th. Eugster}, title = {{DICTATE:} DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {4}, pages = {311--323}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.49}, doi = {10.1109/TDSC.2005.49}, timestamp = {Fri, 17 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LuoHE05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MirkovicR05, author = {Jelena Mirkovic and Peter L. Reiher}, title = {{D-WARD:} {A} Source-End Defense against Flooding Denial-of-Service Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {3}, pages = {216--232}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.35}, doi = {10.1109/TDSC.2005.35}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MirkovicR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NguyenR05, author = {Cung Nguyen and G. Robert Redinbo}, title = {Fault Tolerance Design in {JPEG} 2000 Image Compression System}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {1}, pages = {57--75}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.11}, doi = {10.1109/TDSC.2005.11}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/NguyenR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/OorschotSW05, author = {Paul C. van Oorschot and Anil Somayaji and Glenn Wurster}, title = {Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {2}, pages = {82--92}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.24}, doi = {10.1109/TDSC.2005.24}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/OorschotSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PaxsonW05, author = {Vern Paxson and Michael Waidner}, title = {Guest Editor's Introduction: 2005 {IEEE} Symposium on Security and Privacy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {2}, pages = {81}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.23}, doi = {10.1109/TDSC.2005.23}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PaxsonW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PomeranzR05, author = {Irith Pomeranz and Sudhakar M. Reddy}, title = {Concurrent Online Testing of Identical Circuits Using Nonidentical Input Vectors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {3}, pages = {190--200}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.30}, doi = {10.1109/TDSC.2005.30}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PomeranzR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Shao05, author = {Benjamin B. M. Shao}, title = {Optimal Redundancy Allocation for Information Technology Disaster Recovery in the Network Economy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {3}, pages = {262--267}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.38}, doi = {10.1109/TDSC.2005.38}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Shao05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SunNW05, author = {Kun Sun and Peng Ning and Cliff Wang}, title = {Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {3}, pages = {177--189}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.36}, doi = {10.1109/TDSC.2005.36}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SunNW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Tsai05, author = {Jichiang Tsai}, title = {An Efficient Index-Based Checkpointing Protocol with Constant-Size Control Information on Messages}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {4}, pages = {287--296}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.42}, doi = {10.1109/TDSC.2005.42}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Tsai05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/VaidyanathanT05, author = {Kalyanaraman Vaidyanathan and Kishor S. Trivedi}, title = {A Comprehensive Model for Software Rejuvenation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {2}, pages = {124--137}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.15}, doi = {10.1109/TDSC.2005.15}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/VaidyanathanT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/VoyiatzisH05, author = {Ioannis Voyiatzis and Constantin Halatsis}, title = {A Low-Cost Concurrent {BIST} Scheme for Increased Dependability}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {2}, pages = {150--156}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.16}, doi = {10.1109/TDSC.2005.16}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/VoyiatzisH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YuanM05, author = {Jian Yuan and Kevin L. Mills}, title = {Monitoring the Macroscopic Effect of DDoS Flooding Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {4}, pages = {324--335}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.50}, doi = {10.1109/TDSC.2005.50}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YuanM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhaoMM05, author = {Wenbing Zhao and Louise E. Moser and P. M. Melliar{-}Smith}, title = {Unification of Transactions and Replication in Three-Tier Architectures Based on {CORBA}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {1}, pages = {20--33}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.14}, doi = {10.1109/TDSC.2005.14}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhaoMM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AtluriC04, author = {Vijayalakshmi Atluri and Soon Ae Chun}, title = {An Authorization Model for Geospatial Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {1}, number = {4}, pages = {238--254}, year = {2004}, url = {https://doi.org/10.1109/TDSC.2004.32}, doi = {10.1109/TDSC.2004.32}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AtluriC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AvizienisLRL04, author = {Algirdas Avizienis and Jean{-}Claude Laprie and Brian Randell and Carl E. Landwehr}, title = {Basic Concepts and Taxonomy of Dependable and Secure Computing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {1}, number = {1}, pages = {11--33}, year = {2004}, url = {https://doi.org/10.1109/TDSC.2004.2}, doi = {10.1109/TDSC.2004.2}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AvizienisLRL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BartlettS04, author = {Wendy Bartlett and Lisa Spainhower}, title = {Commercial Fault Tolerance: {A} Tale of Two Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {1}, number = {1}, pages = {87--96}, year = {2004}, url = {https://doi.org/10.1109/TDSC.2004.4}, doi = {10.1109/TDSC.2004.4}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BartlettS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BondavalliCCR04, author = {Andrea Bondavalli and Silvano Chiaradonna and Domenico Cotroneo and Luigi Romano}, title = {Effective Fault Treatment for Improving the Dependability of {COTS} and Legacy-Based Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {1}, number = {4}, pages = {223--237}, year = {2004}, url = {https://doi.org/10.1109/TDSC.2004.40}, doi = {10.1109/TDSC.2004.40}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BondavalliCCR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ElnozahyP04, author = {E. N. Elnozahy and James S. Plank}, title = {Checkpointing for Peta-Scale Systems: {A} Look into the Future of Practical Rollback-Recovery}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {1}, number = {2}, pages = {97--108}, year = {2004}, url = {https://doi.org/10.1109/TDSC.2004.15}, doi = {10.1109/TDSC.2004.15}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ElnozahyP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KarnikHP04, author = {Tanay Karnik and Peter Hazucha and Jagdish Patel}, title = {Characterization of Soft Errors Caused by Single Event Upsets in {CMOS} Processes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {1}, number = {2}, pages = {128--143}, year = {2004}, url = {https://doi.org/10.1109/TDSC.2004.14}, doi = {10.1109/TDSC.2004.14}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KarnikHP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Leveson04, author = {Nancy G. Leveson}, title = {A Systems-Theoretic Approach to Safety in Software-Intensive Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {1}, number = {1}, pages = {66--86}, year = {2004}, url = {https://doi.org/10.1109/TDSC.2004.1}, doi = {10.1109/TDSC.2004.1}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Leveson04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MarshS04, author = {Michael A. Marsh and Fred B. Schneider}, title = {{CODEX:} {A} Robust and Secure Secret Distribution System}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {1}, number = {1}, pages = {34--47}, year = {2004}, url = {https://doi.org/10.1109/TDSC.2004.3}, doi = {10.1109/TDSC.2004.3}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MarshS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NicolST04, author = {David M. Nicol and William H. Sanders and Kishor S. Trivedi}, title = {Model-Based Evaluation: From Dependability to Security}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {1}, number = {1}, pages = {48--65}, year = {2004}, url = {https://doi.org/10.1109/TDSC.2004.11}, doi = {10.1109/TDSC.2004.11}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/NicolST04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ParnoR04, author = {Bryan Parno and Mema Roussopoulos}, title = {Defending a {P2P} Digital Preservation System}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {1}, number = {4}, pages = {209--222}, year = {2004}, url = {https://doi.org/10.1109/TDSC.2004.39}, doi = {10.1109/TDSC.2004.39}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ParnoR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RatanpalWB04, author = {Girish B. Ratanpal and Ronald D. Williams and Travis N. Blalock}, title = {An On-Chip Signal Suppression Countermeasure to Power Analysis Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {1}, number = {3}, pages = {179--189}, year = {2004}, url = {https://doi.org/10.1109/TDSC.2004.25}, doi = {10.1109/TDSC.2004.25}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RatanpalWB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SiewiorekCK04, author = {Daniel P. Siewiorek and Ram Chillarege and Zbigniew Kalbarczyk}, title = {Reflections on Industry Trends and Experimental Research in Dependability}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {1}, number = {2}, pages = {109--127}, year = {2004}, url = {https://doi.org/10.1109/TDSC.2004.20}, doi = {10.1109/TDSC.2004.20}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SiewiorekCK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ValeurVKK04, author = {Fredrik Valeur and Giovanni Vigna and Christopher Kr{\"{u}}gel and Richard A. Kemmerer}, title = {A Comprehensive Approach to Intrusion Detection Alert Correlation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {1}, number = {3}, pages = {146--169}, year = {2004}, url = {https://doi.org/10.1109/TDSC.2004.21}, doi = {10.1109/TDSC.2004.21}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ValeurVKK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangZS04, author = {Haining Wang and Danlu Zhang and Kang G. Shin}, title = {Change-Point Monitoring for the Detection of DoS Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {1}, number = {4}, pages = {193--208}, year = {2004}, url = {https://doi.org/10.1109/TDSC.2004.34}, doi = {10.1109/TDSC.2004.34}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangZS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Yi04, author = {Xun Yi}, title = {Identity-Based Fault-Tolerant Conference Key Agreement}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {1}, number = {3}, pages = {170--178}, year = {2004}, url = {https://doi.org/10.1109/TDSC.2004.31}, doi = {10.1109/TDSC.2004.31}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Yi04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.