Search dblp for Publications

export results for "stream:streams/journals/tdsc:"

 download as .bib file

@article{DBLP:journals/tdsc/0001BOM21,
  author    = {Omar Abdel Wahab and
               Jamal Bentahar and
               Hadi Otrok and
               Azzam Mourad},
  title     = {Resource-Aware Detection and Defense System against Multi-Type Attacks
               in the Cloud: Repeated Bayesian Stackelberg Game},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {605--622},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2907946},
  doi       = {10.1109/TDSC.2019.2907946},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/0001BOM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0001LJ21,
  author    = {Tianhao Wang and
               Ninghui Li and
               Somesh Jha},
  title     = {Locally Differentially Private Heavy Hitter Identification},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {982--993},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2927695},
  doi       = {10.1109/TDSC.2019.2927695},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/0001LJ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0002DB021,
  author    = {Yinghui Zhang and
               Robert H. Deng and
               Elisa Bertino and
               Dong Zheng},
  title     = {Robust and Universal Seamless Handover Authentication in 5G HetNets},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {858--874},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2927664},
  doi       = {10.1109/TDSC.2019.2927664},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/0002DB021.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0002JKPSS21,
  author    = {Tanmoy Chakraborty and
               Sushil Jajodia and
               Jonathan Katz and
               Antonio Picariello and
               Giancarlo Sperl{\`{\i}} and
               V. S. Subrahmanian},
  title     = {A Fake Online Repository Generation Engine for Cyber Deception},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {518--533},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2898661},
  doi       = {10.1109/TDSC.2019.2898661},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/0002JKPSS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0005TYSB21,
  author    = {Long Cheng and
               Ke Tian and
               Danfeng Daphne Yao and
               Lui Sha and
               Raheem A. Beyah},
  title     = {Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical
               Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {825--842},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2906161},
  doi       = {10.1109/TDSC.2019.2906161},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/0005TYSB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/002400C021,
  author    = {Jing Zhang and
               Jie Cui and
               Hong Zhong and
               Zhili Chen and
               Lu Liu},
  title     = {{PA-CRT:} Chinese Remainder Theorem Based Conditional Privacy-Preserving
               Authentication Scheme in Vehicular Ad-Hoc Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {722--735},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2904274},
  doi       = {10.1109/TDSC.2019.2904274},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/002400C021.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/00250WHY00D21,
  author    = {Yue Zhang and
               Jian Weng and
               Jia{-}Si Weng and
               Lin Hou and
               Anjia Yang and
               Ming Li and
               Yang Xiang and
               Robert H. Deng},
  title     = {Looking Back! Using Early Versions of Android Apps as Attack Vectors},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {652--666},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2914202},
  doi       = {10.1109/TDSC.2019.2914202},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/00250WHY00D21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AdepuM21,
  author    = {Sridhar Adepu and
               Aditya Mathur},
  title     = {Distributed Attack Detection in a Water Treatment Plant: Method and
               Case Study},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {86--99},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2875008},
  doi       = {10.1109/TDSC.2018.2875008},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/AdepuM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Al-NaamiEIKTHAR21,
  author    = {Khaled Al{-}Naami and
               Amir El{-}Ghamry and
               Md Shihabul Islam and
               Latifur Khan and
               Bhavani M. Thuraisingham and
               Kevin W. Hamlen and
               Mohammed AlRahmawy and
               Magdi Zakria Rashad},
  title     = {BiMorphing: {A} Bi-Directional Bursting Defense against Website Fingerprinting
               Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {505--517},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2907240},
  doi       = {10.1109/TDSC.2019.2907240},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/Al-NaamiEIKTHAR21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AlacaAO21,
  author    = {Furkan Alaca and
               AbdelRahman Abdou and
               Paul C. van Oorschot},
  title     = {Comparative Analysis and Framework Evaluating Mimicry-Resistant and
               Invisible Web Authentication Schemes},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {534--549},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2908907},
  doi       = {10.1109/TDSC.2019.2908907},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/AlacaAO21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AlamTRM21,
  author    = {Kazi Md. Rokibul Alam and
               Shinsuke Tamura and
               S. M. Saifur Rahman and
               Yasuhiko Morimoto},
  title     = {An Electronic Voting Scheme Based on Revised-SVRM and Confirmation
               Numbers},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {400--410},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2892465},
  doi       = {10.1109/TDSC.2019.2892465},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/AlamTRM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BanerjeeSAC21,
  author    = {Suvadeep Banerjee and
               Balavinayagam Samynathan and
               Jacob A. Abraham and
               Abhijit Chatterjee},
  title     = {Real-Time Error Detection in Nonlinear Control Systems Using Machine
               Learning Assisted State-Space Encoding},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {576--592},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2903049},
  doi       = {10.1109/TDSC.2019.2903049},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/BanerjeeSAC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BhattacharjeeD21,
  author    = {Shameek Bhattacharjee and
               Sajal K. Das},
  title     = {Detection and Forensics against Stealthy Data Falsification in Smart
               Metering Infrastructure},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {356--371},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2889729},
  doi       = {10.1109/TDSC.2018.2889729},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/BhattacharjeeD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BogaertsLJ21,
  author    = {Jasper Bogaerts and
               Bert Lagaisse and
               Wouter Joosen},
  title     = {{SEQUOIA:} {A} Middleware Supporting Policy-Based Access Control for
               Search and Aggregation in Data-Driven Applications},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {325--339},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2889309},
  doi       = {10.1109/TDSC.2018.2889309},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/BogaertsLJ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BowersLSLSH21,
  author    = {Adam Bowers and
               Cong Liao and
               Douglas Steiert and
               Dan Lin and
               Anna Cinzia Squicciarini and
               Ali R. Hurson},
  title     = {Detecting Suspicious File Migration or Replication in the Cloud},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {296--309},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2885271},
  doi       = {10.1109/TDSC.2018.2885271},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/BowersLSLSH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CaiWYW21,
  author    = {Chengjun Cai and
               Jian Weng and
               Xingliang Yuan and
               Cong Wang},
  title     = {Enabling Reliable Keyword Search in Encrypted Decentralized Storage
               with Fairness},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {131--144},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2877332},
  doi       = {10.1109/TDSC.2018.2877332},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/CaiWYW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CaseyBY21,
  author    = {Peter Casey and
               Ibrahim M. Baggili and
               Ananya Yarramreddy},
  title     = {Immersive Virtual Reality Attacks and the Human Joystick},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {550--562},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2907942},
  doi       = {10.1109/TDSC.2019.2907942},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/CaseyBY21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CerfBRMPMBC21,
  author    = {Sophie Cerf and
               Sara Bouchenak and
               Bogdan Robu and
               Nicolas Marchand and
               Vincent Primault and
               Sonia Ben Mokhtar and
               Antoine Boutet and
               Lydia Y. Chen},
  title     = {Automatic Privacy and Utility Preservation for Mobility Data: {A}
               Nonlinear Model-Based Approach},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {269--282},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2884470},
  doi       = {10.1109/TDSC.2018.2884470},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/CerfBRMPMBC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChenWHZCDA21,
  author    = {Jing Chen and
               Chiheng Wang and
               Kun He and
               Ziming Zhao and
               Min Chen and
               Ruiying Du and
               Gail{-}Joon Ahn},
  title     = {Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight
               Assignment for Mobile Apps},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {15--29},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2871682},
  doi       = {10.1109/TDSC.2018.2871682},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChenWHZCDA21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Cheng0S0021,
  author    = {Xi Cheng and
               Min Zhou and
               Xiaoyu Song and
               Ming Gu and
               Jiaguang Sun},
  title     = {Automatic Integer Error Repair by Proper-Type Inference},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {918--935},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2913862},
  doi       = {10.1109/TDSC.2019.2913862},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/Cheng0S0021.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChhetriBF0C021,
  author    = {Sujit Rokka Chhetri and
               Anomadarshi Barua and
               Sina Faezi and
               Francesco Regazzoni and
               Arquimedes Canedo and
               Mohammad Abdullah Al Faruque},
  title     = {Tool of Spies: Leaking your {IP} by Altering the 3D Printer Compiler},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {667--678},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2923215},
  doi       = {10.1109/TDSC.2019.2923215},
  timestamp = {Thu, 25 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChhetriBF0C021.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChizariL21,
  author    = {Hassan Chizari and
               Emil Lupu},
  title     = {Extracting Randomness from the Trend of {IPI} for Cryptographic Operations
               in Implantable Medical Devices},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {875--888},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2921773},
  doi       = {10.1109/TDSC.2019.2921773},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChizariL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ConnellMA21,
  author    = {Warren Connell and
               Daniel A. Menasc{\'{e}} and
               Massimiliano Albanese},
  title     = {Performance Modeling of Moving Target Defenses with Reconfiguration
               Limits},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {205--219},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2882825},
  doi       = {10.1109/TDSC.2018.2882825},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/ConnellMA21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DasKK21,
  author    = {Rajkumar Das and
               Gour C. Karmakar and
               Joarder Kamruzzaman},
  title     = {How Much {I} Can Rely on You: Measuring Trustworthiness of a Twitter
               User},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {949--966},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2929782},
  doi       = {10.1109/TDSC.2019.2929782},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/DasKK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DuZHQZCZ21,
  author    = {Shaoyong Du and
               Pengxiong Zhu and
               Jingyu Hua and
               Zhiyun Qian and
               Zhao Zhang and
               Xiaoyu Chen and
               Sheng Zhong},
  title     = {An Empirical Analysis of Hazardous Uses of Android Shared Storage},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {340--355},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2889486},
  doi       = {10.1109/TDSC.2018.2889486},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/DuZHQZCZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ElrabaaAA21,
  author    = {Muhammad E. S. Elrabaa and
               Mohammed Alasli and
               Marwan H. Abu{-}Amara},
  title     = {Secure Computing Enclaves Using FPGAs},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {593--604},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2933214},
  doi       = {10.1109/TDSC.2019.2933214},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/ElrabaaAA21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GaoSGKPW21,
  author    = {Xing Gao and
               Benjamin Steenkamer and
               Zhongshu Gu and
               Mehmet Kayaalp and
               Dimitrios Pendarakis and
               Haining Wang},
  title     = {A Study on the Security Implications of Information Leakages in Container
               Clouds},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {174--191},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2879605},
  doi       = {10.1109/TDSC.2018.2879605},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/GaoSGKPW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GeYZHLQH21,
  author    = {Xinrui Ge and
               Jia Yu and
               Hanlin Zhang and
               Chengyu Hu and
               Zengpeng Li and
               Zhan Qin and
               Rong Hao},
  title     = {Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data
               with Symmetric-Key Based Verification},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {490--504},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2896258},
  doi       = {10.1109/TDSC.2019.2896258},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/GeYZHLQH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuoZXAL21,
  author    = {Hui Guo and
               Zhenfeng Zhang and
               Jing Xu and
               Ningyu An and
               Xiao Lan},
  title     = {Accountable Proxy Re-Encryption for Secure Data Sharing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {145--159},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2877601},
  doi       = {10.1109/TDSC.2018.2877601},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/GuoZXAL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Hu0W0ZYG21,
  author    = {Xiaokang Hu and
               Jian Li and
               Changzheng Wei and
               Weigang Li and
               Xin Zeng and
               Ping Yu and
               Haibing Guan},
  title     = {{STYX:} {A} Hierarchical Key Management System for Elastic Content
               Delivery Networks on Public Clouds},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {843--857},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2918278},
  doi       = {10.1109/TDSC.2019.2918278},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/Hu0W0ZYG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HuHFW21,
  author    = {Donghui Hu and
               Chunya Hu and
               Yuqi Fan and
               Xintao Wu},
  title     = {oGBAC - {A} Group Based Access Control Framework for Information Sharing
               in Online Social Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {100--116},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2875697},
  doi       = {10.1109/TDSC.2018.2875697},
  timestamp = {Wed, 27 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/HuHFW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HuLYH21,
  author    = {Qiao Hu and
               Yuanzhen Liu and
               Anjia Yang and
               Gerhard P. Hancke},
  title     = {Preventing Overshadowing Attacks in Self-Jamming Audio Channels},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {45--57},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2873767},
  doi       = {10.1109/TDSC.2018.2873767},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/HuLYH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JavaheripiSRJK21,
  author    = {Mojan Javaheripi and
               Mohammad Samragh and
               Bita Darvish Rouhani and
               Tara Javidi and
               Farinaz Koushanfar},
  title     = {CuRTAIL: ChaRacterizing and Thwarting AdversarIal Deep Learning},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {736--752},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2020.3024191},
  doi       = {10.1109/TDSC.2020.3024191},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/JavaheripiSRJK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JinZ21,
  author    = {Rong Jin and
               Kai Zeng},
  title     = {Manipulative Attack Against Physical Layer Key Agreement and Countermeasure},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {475--489},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2895325},
  doi       = {10.1109/TDSC.2019.2895325},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/JinZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KonczakWSZS21,
  author    = {Jan Z. Konczak and
               Pawel T. Wojciechowski and
               Nuno Santos and
               Tomasz Zurkowski and
               Andr{\'{e}} Schiper},
  title     = {Recovery Algorithms for Paxos-Based State Machine Replication},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {623--640},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2926723},
  doi       = {10.1109/TDSC.2019.2926723},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/KonczakWSZS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LaiHJKCT21,
  author    = {Yen{-}Lung Lai and
               Jung Yeon Hwang and
               Zhe Jin and
               Soohyong Kim and
               Sangrae Cho and
               Andrew Beng Jin Teoh},
  title     = {Secure Secret Sharing Enabled b-band Mini Vaults Bio-Cryptosystem
               for Vectorial Biometrics},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {58--71},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2874245},
  doi       = {10.1109/TDSC.2018.2874245},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/LaiHJKCT21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiHWLLDL21,
  author    = {Jin Li and
               Yanyu Huang and
               Yu Wei and
               Siyi Lv and
               Zheli Liu and
               Changyu Dong and
               Wenjing Lou},
  title     = {Searchable Symmetric Encryption with Forward Search Privacy},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {460--474},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2894411},
  doi       = {10.1109/TDSC.2019.2894411},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiHWLLDL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiYS0AL21,
  author    = {Yannan Li and
               Guomin Yang and
               Willy Susilo and
               Yong Yu and
               Man Ho Au and
               Dongxi Liu},
  title     = {Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {679--691},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2910058},
  doi       = {10.1109/TDSC.2019.2910058},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiYS0AL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LianCCM21,
  author    = {Bin Lian and
               Gongliang Chen and
               Jialin Cui and
               Maode Ma},
  title     = {Compact E-Cash with Efficient Coin-Tracing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {220--234},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2882507},
  doi       = {10.1109/TDSC.2018.2882507},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/LianCCM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiangLSLSW21,
  author    = {Bin Liang and
               Hongcheng Li and
               Miaoqiang Su and
               Xirong Li and
               Wenchang Shi and
               Xiaofeng Wang},
  title     = {Detecting Adversarial Image Examples in Deep Neural Networks with
               Adaptive Noise Reduction},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {72--85},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2874243},
  doi       = {10.1109/TDSC.2018.2874243},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiangLSLSW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Liu00L21,
  author    = {Guangchi Liu and
               Qing Yang and
               Honggang Wang and
               Alex X. Liu},
  title     = {Trust Assessment in Online Social Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {994--1007},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2916366},
  doi       = {10.1109/TDSC.2019.2916366},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/Liu00L21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuMXZH21,
  author    = {Jianghua Liu and
               Jinhua Ma and
               Yang Xiang and
               Wanlei Zhou and
               Xinyi Huang},
  title     = {Authenticated Medical Documents Releasing with Privacy Protection
               and Release Control},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {448--459},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2892446},
  doi       = {10.1109/TDSC.2019.2892446},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiuMXZH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuZHC21,
  author    = {Chang Liu and
               Liehuang Zhu and
               Xiangjian He and
               Jinjun Chen},
  title     = {Enabling Privacy-Preserving Shortest Distance Queries on Encrypted
               Graph Data},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {192--204},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2880981},
  doi       = {10.1109/TDSC.2018.2880981},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiuZHC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LuXSKL21,
  author    = {Kangjie Lu and
               Meng Xu and
               Chengyu Song and
               Taesoo Kim and
               Wenke Lee},
  title     = {Stopping Memory Disclosures via Diversification and Replicated Execution},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {160--173},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2878234},
  doi       = {10.1109/TDSC.2018.2878234},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/LuXSKL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Luo0PYZZ21,
  author    = {Chen Luo and
               Fei He and
               Fei Peng and
               Dong Yan and
               Dan Zhang and
               Xin Zhou},
  title     = {PSpec-SQL: Enabling Fine-Grained Control for Distributed Data Analytics},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {810--824},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2914209},
  doi       = {10.1109/TDSC.2019.2914209},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/Luo0PYZZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Ma0H0X21,
  author    = {Shunli Ma and
               Yi Deng and
               Debiao He and
               Jiang Zhang and
               Xiang Xie},
  title     = {An Efficient {NIZK} Scheme for Privacy-Preserving Transactions Over
               Account-Model Blockchain},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {641--651},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2020.2969418},
  doi       = {10.1109/TDSC.2020.2969418},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/Ma0H0X21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MoXLG21,
  author    = {Yuchang Mo and
               Liudong Xing and
               Yi{-}Kuei Lin and
               Wenzhong Guo},
  title     = {Efficient Analysis of Repairable Computing Systems Subject to Scheduled
               Checkpointing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {1--14},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2869393},
  doi       = {10.1109/TDSC.2018.2869393},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/MoXLG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MohantyZAR21,
  author    = {Manoranjan Mohanty and
               Ming Zhang and
               Muhammad Rizwan Asghar and
               Giovanni Russello},
  title     = {e-PRNU: Encrypted Domain PRNU-Based Camera Attribution for Preserving
               Privacy},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {426--437},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2892448},
  doi       = {10.1109/TDSC.2019.2892448},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/MohantyZAR21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NeumeierK21,
  author    = {Yaara Neumeier and
               Osnat Keren},
  title     = {Protecting Multi-Level Memories From Jamming Using Q-ary Expurgated
               Robust Codes},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {936--948},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2021.3050088},
  doi       = {10.1109/TDSC.2021.3050088},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/NeumeierK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Pattaranantakul21,
  author    = {Montida Pattaranantakul and
               Ruan He and
               Zonghua Zhang and
               Ahmed Meddahi and
               Ping Wang},
  title     = {Leveraging Network Functions Virtualization Orchestrators to Achieve
               Software-Defined Access Control in the Clouds},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {372--383},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2889709},
  doi       = {10.1109/TDSC.2018.2889709},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/Pattaranantakul21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PoudelM21,
  author    = {Bikash Poudel and
               Arslan Munir},
  title     = {Design and Evaluation of a Reconfigurable {ECU} Architecture for Secure
               and Dependable Automotive {CPS}},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {235--252},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2883057},
  doi       = {10.1109/TDSC.2018.2883057},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/PoudelM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/QiZ21,
  author    = {Saiyu Qi and
               Yuanqing Zheng},
  title     = {Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the
               Cloud},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {765--779},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2908164},
  doi       = {10.1109/TDSC.2019.2908164},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/QiZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Rrushi21,
  author    = {Julian L. Rrushi},
  title     = {{DNIC} Architectural Developments for 0-Knowledge Detection of {OPC}
               Malware},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {30--44},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2872536},
  doi       = {10.1109/TDSC.2018.2872536},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/Rrushi21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShuYJLWD21,
  author    = {Jiangang Shu and
               Kan Yang and
               Xiaohua Jia and
               Ximeng Liu and
               Cong Wang and
               Robert H. Deng},
  title     = {Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation
               in Crowdsourcing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {117--130},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2875682},
  doi       = {10.1109/TDSC.2018.2875682},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/ShuYJLWD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SiddiqiAS21,
  author    = {Muhammad Siddiqi and
               Syed Taha Ali and
               Vijay Sivaraman},
  title     = {Secure Opportunistic Contextual Logging for Wearable Healthcare Sensing
               Devices},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {753--764},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2927674},
  doi       = {10.1109/TDSC.2019.2927674},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/SiddiqiAS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SinghCF21,
  author    = {Bikash Chandra Singh and
               Barbara Carminati and
               Elena Ferrari},
  title     = {Privacy-Aware Personal Data Storage {(P-PDS):} Learning how to Protect
               User Privacy from External Applications},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {889--903},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2903802},
  doi       = {10.1109/TDSC.2019.2903802},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SinghCF21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SunQ21,
  author    = {Guosong Sun and
               Quan Qian},
  title     = {Deep Learning and Visualization for Identifying Malware Families},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {283--295},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2884928},
  doi       = {10.1109/TDSC.2018.2884928},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/SunQ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Tang0SCS21,
  author    = {Peng Tang and
               Xiang Cheng and
               Sen Su and
               Rui Chen and
               Huaxi Shao},
  title     = {Differentially Private Publication of Vertically Partitioned Data},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {780--795},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2905237},
  doi       = {10.1109/TDSC.2019.2905237},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/Tang0SCS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangY00M21,
  author    = {Leye Wang and
               Dingqi Yang and
               Xiao Han and
               Daqing Zhang and
               Xiaojuan Ma},
  title     = {Mobile Crowdsourcing Task Allocation with Differential-and-Distortion
               Geo-Obfuscation},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {967--981},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2912886},
  doi       = {10.1109/TDSC.2019.2912886},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangY00M21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangZZLGFP21,
  author    = {Jingyi Wang and
               Xinyue Zhang and
               Qixun Zhang and
               Ming Li and
               Yuanxiong Guo and
               Zhiyong Feng and
               Miao Pan},
  title     = {Data-Driven Spectrum Trading with Secondary Users' Differential Privacy
               Preservation},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {438--447},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2892447},
  doi       = {10.1109/TDSC.2019.2892447},
  timestamp = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangZZLGFP21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WuY0GD21,
  author    = {Tong Wu and
               Guomin Yang and
               Yi Mu and
               Fuchun Guo and
               Robert H. Deng},
  title     = {Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business
               Model},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {563--575},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2931193},
  doi       = {10.1109/TDSC.2019.2931193},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/WuY0GD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XieCM21,
  author    = {Ning Xie and
               Changsheng Chen and
               Zhong Ming},
  title     = {Security Model of Authentication at the Physical Layer and Performance
               Analysis over Fading Channels},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {253--268},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2883598},
  doi       = {10.1109/TDSC.2018.2883598},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/XieCM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuJK21,
  author    = {Runhua Xu and
               James Joshi and
               Prashant Krishnamurthy},
  title     = {An Integrated Privacy Preserving Attribute-Based Access Control Framework
               Supporting Secure Deduplication},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {706--721},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2946073},
  doi       = {10.1109/TDSC.2019.2946073},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/XuJK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YaoC0LW21,
  author    = {Lin Yao and
               Zhenyu Chen and
               Xin Wang and
               Dong Liu and
               Guowei Wu},
  title     = {Sensitive Label Privacy Preservation with Anatomization for Data Publishing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {904--917},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2919833},
  doi       = {10.1109/TDSC.2019.2919833},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/YaoC0LW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangWJS21,
  author    = {Mengyuan Zhang and
               Lingyu Wang and
               Sushil Jajodia and
               Anoop Singhal},
  title     = {Network Attack Surface: Lifting the Concept of Attack Surface to the
               Network Level for Evaluating Networks' Resilience Against Zero-Day
               Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {310--324},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2018.2889086},
  doi       = {10.1109/TDSC.2018.2889086},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhangWJS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhengWH21,
  author    = {Shuli Zheng and
               Yuzhao Wang and
               Donghui Hu},
  title     = {Lossless Data Hiding Based on Homomorphic Cryptosystem},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {692--705},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2913422},
  doi       = {10.1109/TDSC.2019.2913422},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhengWH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhuAV21,
  author    = {Xiaojie Zhu and
               Erman Ayday and
               Roman Vitenberg},
  title     = {A Privacy-Preserving Framework for Outsourcing Location-Based Services
               to the Cloud},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {384--399},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2892150},
  doi       = {10.1109/TDSC.2019.2892150},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhuAV21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhuRGGB21,
  author    = {Ye Zhu and
               Nicholas Ruffing and
               Jonathan Gurary and
               Yong Guan and
               Riccardo Bettati},
  title     = {Towards Smartphone Operating System Identification},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {1},
  pages     = {411--425},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2892482},
  doi       = {10.1109/TDSC.2019.2892482},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhuRGGB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZoppiCB21,
  author    = {Tommaso Zoppi and
               Andrea Ceccarelli and
               Andrea Bondavalli},
  title     = {MADneSs: {A} Multi-Layer Anomaly Detection Framework for Complex Dynamic
               Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {18},
  number    = {2},
  pages     = {796--809},
  year      = {2021},
  url       = {https://doi.org/10.1109/TDSC.2019.2908366},
  doi       = {10.1109/TDSC.2019.2908366},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZoppiCB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0001TWQ20,
  author    = {Zheng Zheng and
               Kishor S. Trivedi and
               Nan Wang and
               Kun Qiu},
  title     = {Markov Regenerative Models of WebServers for Their User-Perceived
               Availability and Bottlenecks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {1},
  pages     = {92--105},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2753803},
  doi       = {10.1109/TDSC.2017.2753803},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/0001TWQ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0004ZFGZZ20,
  author    = {Yuan Zhang and
               Boyu Zhu and
               Yixin Fang and
               Suxin Guo and
               Aidong Zhang and
               Sheng Zhong},
  title     = {Secure Inter-Domain Forwarding Loop Test in Software Defined Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {1},
  pages     = {162--178},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2731773},
  doi       = {10.1109/TDSC.2017.2731773},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/0004ZFGZZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0026LDL20,
  author    = {Yang Yang and
               Ximeng Liu and
               Robert H. Deng and
               Yingjiu Li},
  title     = {Lightweight Sharable and Traceable Secure Mobile Health System},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {1},
  pages     = {78--91},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2729556},
  doi       = {10.1109/TDSC.2017.2729556},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/0026LDL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AbrathCMBS20,
  author    = {Bert Abrath and
               Bart Coppens and
               Mohit Mishra and
               Jens Van den Broeck and
               Bjorn De Sutter},
  title     = {{\textdollar}{\textbackslash}Delta{\textdollar}{\(\Delta\)}Breakpad:
               Diversified Binary Crash Reporting},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {4},
  pages     = {841--856},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2823751},
  doi       = {10.1109/TDSC.2018.2823751},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AbrathCMBS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AizpuruaPM20,
  author    = {Jose Ignacio Aizpurua and
               Yiannis Papadopoulos and
               Guillaume Merle},
  title     = {Explicit Modelling and Treatment of Repair in Prediction of Dependability},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {6},
  pages     = {1147--1162},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2857810},
  doi       = {10.1109/TDSC.2018.2857810},
  timestamp = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/AizpuruaPM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BehniaOY20,
  author    = {Rouzbeh Behnia and
               Muslum Ozgur Ozmen and
               Attila Altay Yavuz},
  title     = {Lattice-Based Public Key Searchable Encryption from Experimental Perspectives},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {6},
  pages     = {1269--1282},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2867462},
  doi       = {10.1109/TDSC.2018.2867462},
  timestamp = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/BehniaOY20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BergeCGW20,
  author    = {Pierre Berg{\'{e}} and
               Jason Crampton and
               Gregory Z. Gutin and
               R{\'{e}}mi Watrigant},
  title     = {The Authorization Policy Existence Problem},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {6},
  pages     = {1333--1344},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2883416},
  doi       = {10.1109/TDSC.2018.2883416},
  timestamp = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/BergeCGW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CatuognoGP20,
  author    = {Luigi Catuogno and
               Clemente Galdi and
               Giuseppe Persiano},
  title     = {Secure Dependency Enforcement in Package Management Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {2},
  pages     = {377--390},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2777991},
  doi       = {10.1109/TDSC.2017.2777991},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CatuognoGP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChakrabortyPS20,
  author    = {Tanmoy Chakraborty and
               Fabio Pierazzi and
               V. S. Subrahmanian},
  title     = {{EC2:} Ensemble Clustering and Classification for Predicting Android
               Malware Families},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {2},
  pages     = {262--277},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2739145},
  doi       = {10.1109/TDSC.2017.2739145},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChakrabortyPS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChenHCP20,
  author    = {Jiayi Chen and
               Jianping He and
               Lin Cai and
               Jianping Pan},
  title     = {Disclose More and Risk Less: Privacy Preserving Online Social Network
               Data Sharing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {6},
  pages     = {1173--1187},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2861403},
  doi       = {10.1109/TDSC.2018.2861403},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChenHCP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CleemputSB20,
  author    = {Jeroen Van Cleemput and
               Bjorn De Sutter and
               Koen De Bosschere},
  title     = {Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {1},
  pages     = {35--49},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2729549},
  doi       = {10.1109/TDSC.2017.2729549},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CleemputSB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DingYD20,
  author    = {Wenxiu Ding and
               Zheng Yan and
               Robert H. Deng},
  title     = {Privacy-Preserving Data Processing with Flexible Access Control},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {2},
  pages     = {363--376},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2786247},
  doi       = {10.1109/TDSC.2017.2786247},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/DingYD20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DongWMPGG20,
  author    = {Boxiang Dong and
               Hui Wang and
               Anna Monreale and
               Dino Pedreschi and
               Fosca Giannotti and
               Wenge Guo},
  title     = {Authenticated Outlier Mining for Outsourced Databases},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {2},
  pages     = {222--235},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2754493},
  doi       = {10.1109/TDSC.2017.2754493},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/DongWMPGG20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/EmuraHI20,
  author    = {Keita Emura and
               Takuya Hayashi and
               Ai Ishida},
  title     = {Group Signatures with Time-Bound Keys Revisited: {A} New Model, an
               Efficient Construction, and its Implementation},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {2},
  pages     = {292--305},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2754247},
  doi       = {10.1109/TDSC.2017.2754247},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/EmuraHI20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ErrapotuLYRPPH20,
  author    = {Sai Mounika Errapotu and
               Hongning Li and
               Rong Yu and
               Shaolei Ren and
               Qingqi Pei and
               Miao Pan and
               Zhu Han},
  title     = {Clock Auction Inspired Privacy Preserving Emergency Demand Response
               in Colocation Data Centers},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {4},
  pages     = {691--702},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2875732},
  doi       = {10.1109/TDSC.2018.2875732},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ErrapotuLYRPPH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/EspositoFCPS20,
  author    = {Christian Esposito and
               Massimo Ficco and
               Aniello Castiglione and
               Francesco Palmieri and
               Alfredo De Santis},
  title     = {Distributed Group Key Management for Event Notification Confidentiality
               Among Sensors},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {3},
  pages     = {566--580},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2799227},
  doi       = {10.1109/TDSC.2018.2799227},
  timestamp = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/EspositoFCPS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FengYZC20,
  author    = {Jun Feng and
               Laurence T. Yang and
               Qing Zhu and
               Kim{-}Kwang Raymond Choo},
  title     = {Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated
               Cloud Environment},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {4},
  pages     = {857--868},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2881452},
  doi       = {10.1109/TDSC.2018.2881452},
  timestamp = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/FengYZC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GovindarajGK20,
  author    = {Rekha Govindaraj and
               Swaroop Ghosh and
               Srinivas Katkoori},
  title     = {Design, Analysis and Application of Embedded Resistive {RAM} Based
               Strong Arbiter {PUF}},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {6},
  pages     = {1232--1242},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2866425},
  doi       = {10.1109/TDSC.2018.2866425},
  timestamp = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/GovindarajGK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HanCCLFXW20,
  author    = {Weili Han and
               Chang Cao and
               Hao Chen and
               Dong Li and
               Zheran Fang and
               Wenyuan Xu and
               X. Sean Wang},
  title     = {senDroid: Auditing Sensor Access in Android System-Wide},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {2},
  pages     = {407--421},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2768536},
  doi       = {10.1109/TDSC.2017.2768536},
  timestamp = {Fri, 26 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HanCCLFXW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HeGWWLY20,
  author    = {Kai He and
               Jun Guo and
               Jian Weng and
               Jia{-}Si Weng and
               Joseph K. Liu and
               Xun Yi},
  title     = {Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted
               Data},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {6},
  pages     = {1207--1217},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2864186},
  doi       = {10.1109/TDSC.2018.2864186},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HeGWWLY20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HolgadoVV20,
  author    = {Pilar Holgado and
               V{\'{\i}}ctor A. Villagr{\'{a}} and
               Luis V{\'{a}}zquez},
  title     = {Real-Time Multistep Attack Prediction Based on Hidden Markov Models},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {1},
  pages     = {134--147},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2751478},
  doi       = {10.1109/TDSC.2017.2751478},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HolgadoVV20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HuangSKKN20,
  author    = {Chin{-}Tser Huang and
               Muhammad N. Sakib and
               Charles A. Kamhoua and
               Kevin A. Kwiat and
               Laurent Njilla},
  title     = {A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {6},
  pages     = {1257--1268},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2866821},
  doi       = {10.1109/TDSC.2018.2866821},
  timestamp = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/HuangSKKN20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HuangZPX20,
  author    = {Yonggang Huang and
               Jun Zhang and
               Lei Pan and
               Yang Xiang},
  title     = {Privacy Protection in Interactive Content Based Image Retrieval},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {3},
  pages     = {595--607},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2793923},
  doi       = {10.1109/TDSC.2018.2793923},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HuangZPX20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/InanGS20,
  author    = {Ali Inan and
               Mehmet Emre Gursoy and
               Y{\"{u}}cel Saygin},
  title     = {Sensitivity Analysis for Non-Interactive Differential Privacy: Bounds
               and Efficient Algorithms},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {1},
  pages     = {194--207},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2734664},
  doi       = {10.1109/TDSC.2017.2734664},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/InanGS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ItkinW20,
  author    = {Eyal Itkin and
               Avishai Wool},
  title     = {A Security Analysis and Revised Security Extension for the Precision
               Time Protocol},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {1},
  pages     = {22--34},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2748583},
  doi       = {10.1109/TDSC.2017.2748583},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ItkinW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JiangXWLW20,
  author    = {Linzhi Jiang and
               Chunxiang Xu and
               Xiaofang Wang and
               Bo Luo and
               Huaqun Wang},
  title     = {Secure outsourcing {SIFT:} Efficient and Privacy-Preserving Image
               Feature Extraction in the Encrypted Domain},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {1},
  pages     = {179--193},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2751476},
  doi       = {10.1109/TDSC.2017.2751476},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/JiangXWLW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JohnHOD20,
  author    = {Tara Merin John and
               Syed Kamran Haider and
               Hamza Omar and
               Marten van Dijk},
  title     = {Connecting the Dots: Privacy Leakage via Write-Access Patterns to
               the Main Memory},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {2},
  pages     = {436--442},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2779780},
  doi       = {10.1109/TDSC.2017.2779780},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/JohnHOD20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JumaSBT20,
  author    = {Nahid Juma and
               Jonathan Shahen and
               Khalid Zaman Bijon and
               Mahesh Tripunitara},
  title     = {The Overhead from Combating Side-Channels in Cloud Systems Using VM-Scheduling},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {2},
  pages     = {422--435},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2790932},
  doi       = {10.1109/TDSC.2018.2790932},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/JumaSBT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KaitovicM20,
  author    = {Igor Kaitovic and
               Miroslaw Malek},
  title     = {Impact of Failure Prediction on Availability: Modeling and Comparative
               Analysis of Predictive and Reactive Methods},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {3},
  pages     = {493--505},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2806448},
  doi       = {10.1109/TDSC.2018.2806448},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KaitovicM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KaplanGNS20,
  author    = {Emre Kaplan and
               Mehmet Emre Gursoy and
               Mehmet Ercan Nergiz and
               Y{\"{u}}cel Saygin},
  title     = {Known Sample Attacks on Relation Preserving Data Transformations},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {2},
  pages     = {443--450},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2759732},
  doi       = {10.1109/TDSC.2017.2759732},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KaplanGNS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KhasawnehODAP20,
  author    = {Khaled N. Khasawneh and
               Meltem Ozsoy and
               Caleb Donovick and
               Nael B. Abu{-}Ghazaleh and
               Dmitry Ponomarev},
  title     = {EnsembleHMD: Accurate Hardware Malware Detectors with Specialized
               Ensemble Classifiers},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {3},
  pages     = {620--633},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2801858},
  doi       = {10.1109/TDSC.2018.2801858},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KhasawnehODAP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KlempererJPH20,
  author    = {Peter F. Klemperer and
               Hye Yoon Jeon and
               Bryan D. Payne and
               James C. Hoe},
  title     = {High-Performance Memory Snapshotting for Real-Time, Consistent, Hypervisor-Based
               Monitors},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {3},
  pages     = {518--535},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2805904},
  doi       = {10.1109/TDSC.2018.2805904},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KlempererJPH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiCZMWS20,
  author    = {Huaxin Li and
               Qingrong Chen and
               Haojin Zhu and
               Di Ma and
               Hong Wen and
               Xuemin Sherman Shen},
  title     = {Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous
               Social Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {2},
  pages     = {350--362},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2754249},
  doi       = {10.1109/TDSC.2017.2754249},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiCZMWS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiLSWLL20,
  author    = {Jing Li and
               Peng Li and
               Rebecca J. Stones and
               Gang Wang and
               Zhongwei Li and
               Xiaoguang Liu},
  title     = {Reliability Equations for Cloud Storage Systems with Proactive Fault
               Tolerance},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {4},
  pages     = {782--794},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2882512},
  doi       = {10.1109/TDSC.2018.2882512},
  timestamp = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiLSWLL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiZQFR20,
  author    = {Sheng Li and
               Xinpeng Zhang and
               Zhenxing Qian and
               Guorui Feng and
               Yanli Ren},
  title     = {Key Based Artificial Fingerprint Generation for Privacy Protection},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {4},
  pages     = {828--840},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2812192},
  doi       = {10.1109/TDSC.2018.2812192},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiZQFR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiangPK20,
  author    = {Xiaohui Liang and
               Ronald A. Peterson and
               David Kotz},
  title     = {Securely Connecting Wearables to Ambient Displays with User Intent},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {4},
  pages     = {676--690},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2840979},
  doi       = {10.1109/TDSC.2018.2840979},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiangPK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuLPRS20,
  author    = {Zhe Liu and
               Patrick Longa and
               Geovandro C. C. F. Pereira and
               Oscar Reparaz and
               Hwajeong Seo},
  title     = {Four{\textdollar}{\textbackslash}mathbb \{Q\}{\textdollar}Q on Embedded
               Devices with Strong Countermeasures Against Side-Channel Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {3},
  pages     = {536--549},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2799844},
  doi       = {10.1109/TDSC.2018.2799844},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiuLPRS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuLZL20,
  author    = {Zishan Liu and
               Zhenyu Liu and
               Lin Zhang and
               Xiaodong Lin},
  title     = {{MARP:} {A} Distributed {MAC} Layer Attack Resistant Pseudonym Scheme
               for {VANET}},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {4},
  pages     = {869--882},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2838136},
  doi       = {10.1109/TDSC.2018.2838136},
  timestamp = {Mon, 10 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiuLZL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuYMD20,
  author    = {Xueqiao Liu and
               Guomin Yang and
               Yi Mu and
               Robert H. Deng},
  title     = {Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {6},
  pages     = {1322--1332},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2876831},
  doi       = {10.1109/TDSC.2018.2876831},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiuYMD20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LuLHL20,
  author    = {Li Lu and
               Lingshuang Liu and
               Muhammad Jawad Hussain and
               Yongshuai Liu},
  title     = {I Sense You by Breath: Speaker Recognition via Breath Biometrics},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {2},
  pages     = {306--319},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2767587},
  doi       = {10.1109/TDSC.2017.2767587},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LuLHL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaAZLXLMG20,
  author    = {Xiaobo Ma and
               Bo An and
               Mengchen Zhao and
               Xiapu Luo and
               Lei Xue and
               Zhenhua Li and
               Tony T. N. Miu and
               Xiaohong Guan},
  title     = {Randomized Security Patrolling for Link Flooding Attack Detection},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {4},
  pages     = {795--812},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2019.2892370},
  doi       = {10.1109/TDSC.2019.2892370},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MaAZLXLMG20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaruseacG20,
  author    = {Mihai Maruseac and
               Gabriel Ghinita},
  title     = {Precision-Enhanced Differentially-Private Mining of High-Confidence
               Association Rules},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {6},
  pages     = {1297--1309},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2868190},
  doi       = {10.1109/TDSC.2018.2868190},
  timestamp = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/MaruseacG20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MohaisenGRLKNN20,
  author    = {Aziz Mohaisen and
               Zhongshu Gu and
               Kui Ren and
               Zhenhua Li and
               Charles A. Kamhoua and
               Laurent L. Njilla and
               DaeHun Nyang},
  title     = {Look-Aside at Your Own Risk: Privacy Implications of {DNSSEC} Look-Aside
               Validation},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {4},
  pages     = {745--759},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2816026},
  doi       = {10.1109/TDSC.2018.2816026},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MohaisenGRLKNN20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MontieriCAP20,
  author    = {Antonio Montieri and
               Domenico Ciuonzo and
               Giuseppe Aceto and
               Antonio Pescap{\`{e}}},
  title     = {Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web)},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {3},
  pages     = {662--675},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2804394},
  doi       = {10.1109/TDSC.2018.2804394},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MontieriCAP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MunirK20,
  author    = {Arslan Munir and
               Farinaz Koushanfar},
  title     = {Design and Analysis of Secure and Dependable Automotive {CPS:} {A}
               Steer-by-Wire Case Study},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {4},
  pages     = {813--827},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2846741},
  doi       = {10.1109/TDSC.2018.2846741},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MunirK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NaroueiTN20,
  author    = {Masoud Narouei and
               Hassan Takabi and
               Rodney Nielsen},
  title     = {Automatic Extraction of Access Control Policies from Natural Language
               Documents},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {3},
  pages     = {506--517},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2818708},
  doi       = {10.1109/TDSC.2018.2818708},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/NaroueiTN20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NiZYLS20,
  author    = {Jianbing Ni and
               Kuan Zhang and
               Yong Yu and
               Xiaodong Lin and
               Xuemin Sherman Shen},
  title     = {Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing
               via Fog Computing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {3},
  pages     = {581--594},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2791432},
  doi       = {10.1109/TDSC.2018.2791432},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/NiZYLS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PanH0G0TC20,
  author    = {Yanjun Pan and
               Yantian Hou and
               Ming Li and
               Ryan M. Gerdes and
               Kai Zeng and
               Md. Asaduzzaman Towfiq and
               Bedri A. Cetiner},
  title     = {Message Integrity Protection Over Wireless Channel: Countering Signal
               Cancellation via Channel Randomization},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {1},
  pages     = {106--120},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2751600},
  doi       = {10.1109/TDSC.2017.2751600},
  timestamp = {Sat, 30 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PanH0G0TC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ParkKRWHX20,
  author    = {Sungjin Park and
               Chung Hwan Kim and
               Junghwan Rhee and
               Jong{-}Jin Won and
               Taisook Han and
               Dongyan Xu},
  title     = {{CAFE:} {A} Virtualization-Based Approach to Protecting Sensitive
               Cloud Application Logic Confidentiality},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {4},
  pages     = {883--897},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2817545},
  doi       = {10.1109/TDSC.2018.2817545},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ParkKRWHX20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RahmanD20,
  author    = {Mohammad Ashiqur Rahman and
               Amarjit Datta},
  title     = {Impact of Stealthy Attacks on Optimal Power Flow: {A} Simulink-Driven
               Formal Analysis},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {3},
  pages     = {451--464},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2806969},
  doi       = {10.1109/TDSC.2018.2806969},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RahmanD20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RajkumarS20,
  author    = {P. V. Rajkumar and
               Ravi S. Sandhu},
  title     = {Safety Decidability for Pre-Authorization Usage Control with Identifier
               Attribute Domains},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {3},
  pages     = {465--478},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2839745},
  doi       = {10.1109/TDSC.2018.2839745},
  timestamp = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/RajkumarS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SalvePMR20,
  author    = {Andrea De Salve and
               Roberto Di Pietro and
               Paolo Mori and
               Laura Ricci},
  title     = {A Logical Key Hierarchy Based Approach to Preserve Content Privacy
               in Decentralized Online Social Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {1},
  pages     = {2--21},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2729553},
  doi       = {10.1109/TDSC.2017.2729553},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SalvePMR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SatyalWB020,
  author    = {Suhrid Satyal and
               Ingo Weber and
               Len Bass and
               Min Fu},
  title     = {Rollback Mechanisms for Cloud Management APIs Using {AI} Planning},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {1},
  pages     = {148--161},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2729543},
  doi       = {10.1109/TDSC.2017.2729543},
  timestamp = {Sat, 30 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SatyalWB020.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SaxenaSKCC20,
  author    = {Neetesh Saxena and
               Hong Shen and
               Nikos Komninos and
               Kim{-}Kwang Raymond Choo and
               Narendra S. Chaudhari},
  title     = {{BVPSMS:} {A} Batch Verification Protocol for End-to-End Secure {SMS}
               for Mobile Users},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {3},
  pages     = {550--565},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2799223},
  doi       = {10.1109/TDSC.2018.2799223},
  timestamp = {Sat, 30 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SaxenaSKCC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShahzadSL20,
  author    = {Muhammad Shahzad and
               M. Zubair Shafiq and
               Alex X. Liu},
  title     = {Large Scale Characterization of Software Vulnerability Life Cycles},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {4},
  pages     = {730--744},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2019.2893950},
  doi       = {10.1109/TDSC.2019.2893950},
  timestamp = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/ShahzadSL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShenCGM20,
  author    = {Chao Shen and
               Yufei Chen and
               Xiaohong Guan and
               Roy A. Maxion},
  title     = {Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active
               User Authentication System},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {2},
  pages     = {335--349},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2771295},
  doi       = {10.1109/TDSC.2017.2771295},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ShenCGM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShenLSG20,
  author    = {Zhirong Shen and
               Patrick P. C. Lee and
               Jiwu Shu and
               Wenzhong Guo},
  title     = {Cross-Rack-Aware Single Failure Recovery for Clustered File Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {2},
  pages     = {248--261},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2774299},
  doi       = {10.1109/TDSC.2017.2774299},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ShenLSG20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SrinivasDWK20,
  author    = {Jangirala Srinivas and
               Ashok Kumar Das and
               Mohammad Wazid and
               Neeraj Kumar},
  title     = {Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement
               Protocol for Industrial Internet of Things},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {6},
  pages     = {1133--1146},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2857811},
  doi       = {10.1109/TDSC.2018.2857811},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/SrinivasDWK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TianYRTP20,
  author    = {Ke Tian and
               Danfeng Yao and
               Barbara G. Ryder and
               Gang Tan and
               Guojun Peng},
  title     = {Detection of Repackaged Android Malware with Code-Heterogeneity Features},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {1},
  pages     = {64--77},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2745575},
  doi       = {10.1109/TDSC.2017.2745575},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/TianYRTP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Vaidya20,
  author    = {Jaideep Vaidya},
  title     = {Editorial},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {1},
  pages     = {1},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2019.2958396},
  doi       = {10.1109/TDSC.2019.2958396},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Vaidya20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ViscontiG20,
  author    = {Andrea Visconti and
               Federico Gorla},
  title     = {Exploiting an {HMAC-SHA-1} Optimization to Speed up {PBKDF2}},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {4},
  pages     = {775--781},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2878697},
  doi       = {10.1109/TDSC.2018.2878697},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ViscontiG20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WalzS20,
  author    = {Andreas Walz and
               Axel Sikora},
  title     = {Exploiting Dissent: Towards Fuzzing-Based Differential Black-Box Testing
               of {TLS} Implementations},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {2},
  pages     = {278--291},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2763947},
  doi       = {10.1109/TDSC.2017.2763947},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WalzS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangCCM20,
  author    = {An Wang and
               Wentao Chang and
               Songqing Chen and
               Aziz Mohaisen},
  title     = {A Data-Driven Study of DDoS Attacks and Their Dynamics},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {3},
  pages     = {648--661},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2808344},
  doi       = {10.1109/TDSC.2018.2808344},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangCCM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WazidDOKS20,
  author    = {Mohammad Wazid and
               Ashok Kumar Das and
               Vanga Odelu and
               Neeraj Kumar and
               Willy Susilo},
  title     = {Secure Remote User Authenticated Key Establishment Protocol for Smart
               Home Environment},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {2},
  pages     = {391--406},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2764083},
  doi       = {10.1109/TDSC.2017.2764083},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WazidDOKS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XieFHLSL20,
  author    = {Yulai Xie and
               Dan Feng and
               Yuchong Hu and
               Yan Li and
               Staunton Sample and
               Darrell D. E. Long},
  title     = {Pagoda: {A} Hybrid Approach to Enable Efficient Real-Time Provenance
               Based Intrusion Detection in Big Data Environments},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {6},
  pages     = {1283--1296},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2867595},
  doi       = {10.1109/TDSC.2018.2867595},
  timestamp = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/XieFHLSL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuTCW20,
  author    = {Wenyuan Xu and
               Jing Tian and
               Yu Cao and
               Song Wang},
  title     = {Challenge-Response Authentication Using In-Air Handwriting Style Verification},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {1},
  pages     = {51--64},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2752164},
  doi       = {10.1109/TDSC.2017.2752164},
  timestamp = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/XuTCW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuZZL20,
  author    = {Hui Xu and
               Zirui Zhao and
               Yangfan Zhou and
               Michael R. Lyu},
  title     = {Benchmarking the Capability of Symbolic Execution Tools with Logic
               Bombs},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {6},
  pages     = {1243--1256},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2866469},
  doi       = {10.1109/TDSC.2018.2866469},
  timestamp = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/XuZZL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YangLD20,
  author    = {Yang Yang and
               Ximeng Liu and
               Robert H. Deng},
  title     = {Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary
               Language},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {2},
  pages     = {320--334},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2787588},
  doi       = {10.1109/TDSC.2017.2787588},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/YangLD20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YangLYT20,
  author    = {Lu{-}Xing Yang and
               Pengdeng Li and
               Xiaofan Yang and
               Yuan Yan Tang},
  title     = {A Risk Management Approach to Defending Against the Advanced Persistent
               Threat},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {6},
  pages     = {1163--1172},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2858786},
  doi       = {10.1109/TDSC.2018.2858786},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/YangLYT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YaoFDFW20,
  author    = {Lin Yao and
               Zhenzhen Fan and
               Jing Deng and
               Xin Fan and
               Guowei Wu},
  title     = {Detection and Defense of Cache Pollution Attacks Using Clustering
               in Named Data Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {6},
  pages     = {1310--1321},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2876257},
  doi       = {10.1109/TDSC.2018.2876257},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/YaoFDFW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YouLSWZ20,
  author    = {Wei You and
               Bin Liang and
               Wenchang Shi and
               Peng Wang and
               Xiangyu Zhang},
  title     = {TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified
               and Non-Rooted Android Devices},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {1},
  pages     = {209--222},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2740169},
  doi       = {10.1109/TDSC.2017.2740169},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/YouLSWZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangL20,
  author    = {Yan Zhang and
               Loukas Lazos},
  title     = {Misbehavior in Multi-Channel {MAC} Protocols},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {4},
  pages     = {760--774},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2819170},
  doi       = {10.1109/TDSC.2018.2819170},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhangL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangMCZD20,
  author    = {Lei Zhang and
               Xinyu Meng and
               Kim{-}Kwang Raymond Choo and
               Yuanfei Zhang and
               Feifei Dai},
  title     = {Privacy-Preserving Cloud Establishment and Data Dissemination Scheme
               for Vehicular Cloud},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {3},
  pages     = {634--647},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2797190},
  doi       = {10.1109/TDSC.2018.2797190},
  timestamp = {Sat, 30 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhangMCZD20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangYHWR20,
  author    = {Yue Zhang and
               Jia Yu and
               Rong Hao and
               Cong Wang and
               Kui Ren},
  title     = {Enabling Efficient User Revocation in Identity-Based Cloud Storage
               Auditing for Shared Big Data},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {3},
  pages     = {608--619},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2829880},
  doi       = {10.1109/TDSC.2018.2829880},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhangYHWR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangZHC20,
  author    = {Zhikun Zhang and
               Heng Zhang and
               Shibo He and
               Peng Cheng},
  title     = {Bilateral Privacy-Preserving Utility Maximization Protocol in Database-Driven
               Cognitive Radio Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {2},
  pages     = {236--247},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2781248},
  doi       = {10.1109/TDSC.2017.2781248},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhangZHC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangZWWSR20,
  author    = {Leo Yu Zhang and
               Yifeng Zheng and
               Jian Weng and
               Cong Wang and
               Zihao Shan and
               Kui Ren},
  title     = {You Can Access but You Cannot Leak: Defending Against Illegal Content
               Redistribution in Encrypted Cloud Media Center},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {6},
  pages     = {1218--1231},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2864748},
  doi       = {10.1109/TDSC.2018.2864748},
  timestamp = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhangZWWSR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhaoC20,
  author    = {Liang Zhao and
               Liqun Chen},
  title     = {Sparse Matrix Masking-Based Non-Interactive Verifiable (Outsourced)
               Computation, Revisited},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {6},
  pages     = {1188--1206},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2861699},
  doi       = {10.1109/TDSC.2018.2861699},
  timestamp = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhaoC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhaoKKKN20,
  author    = {Hong Zhao and
               Luke Kwiat and
               Kevin A. Kwiat and
               Charles A. Kamhoua and
               Laurent Njilla},
  title     = {Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {4},
  pages     = {716--729},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2864733},
  doi       = {10.1109/TDSC.2018.2864733},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhaoKKKN20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhengDY020,
  author    = {Yifeng Zheng and
               Huayi Duan and
               Xingliang Yuan and
               Cong Wang},
  title     = {Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {1},
  pages     = {121--133},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2017.2753245},
  doi       = {10.1109/TDSC.2017.2753245},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhengDY020.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhuLZM20,
  author    = {Xiaonan Zhu and
               Jinku Li and
               Yajin Zhou and
               Jianfeng Ma},
  title     = {AdCapsule: Practical Confinement of Advertisements in Android Applications},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {3},
  pages     = {479--492},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2814999},
  doi       = {10.1109/TDSC.2018.2814999},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhuLZM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhuLZQ20,
  author    = {Liehuang Zhu and
               Meng Li and
               Zijian Zhang and
               Zhan Qin},
  title     = {{ASAP:} An Anonymous Smart-Parking and Payment Scheme in Vehicular
               Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {17},
  number    = {4},
  pages     = {703--715},
  year      = {2020},
  url       = {https://doi.org/10.1109/TDSC.2018.2850780},
  doi       = {10.1109/TDSC.2018.2850780},
  timestamp = {Wed, 19 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhuLZQ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0010MSZ19,
  author    = {Song Gao and
               Manar Mohamed and
               Nitesh Saxena and
               Chengcui Zhang},
  title     = {Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs,
               and Countermeasures},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {6},
  pages     = {1040--1053},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2719031},
  doi       = {10.1109/TDSC.2017.2719031},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/0010MSZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AbadiTMD19,
  author    = {Aydin Abadi and
               Sotirios Terzis and
               Roberto Metere and
               Changyu Dong},
  title     = {Efficient Delegated Private Set Intersection on Outsourced Private
               Datasets},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {4},
  pages     = {608--624},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2708710},
  doi       = {10.1109/TDSC.2017.2708710},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AbadiTMD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AbderrahimC19,
  author    = {Wiem Abderrahim and
               Zi{\`{e}}d Choukair},
  title     = {Dependability Integration in Cloud-hosted Telecommunication Services},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {6},
  pages     = {957--968},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2018.2875088},
  doi       = {10.1109/TDSC.2018.2875088},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AbderrahimC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AcsCGGTW19,
  author    = {Gergely {\'{A}}cs and
               Mauro Conti and
               Paolo Gasti and
               Cesar Ghali and
               Gene Tsudik and
               Christopher A. Wood},
  title     = {Privacy-Aware Caching in Information-Centric Networking},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {2},
  pages     = {313--328},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2679711},
  doi       = {10.1109/TDSC.2017.2679711},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AcsCGGTW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AhnGHS19,
  author    = {Gail{-}Joon Ahn and
               Guofei Gu and
               Hongxin Hu and
               Seungwon Shin},
  title     = {Guest Editors' Introduction: Special Section on Security in Emerging
               Networking Technologies},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {6},
  pages     = {913--914},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2019.2906921},
  doi       = {10.1109/TDSC.2019.2906921},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AhnGHS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AmmarCJHD19,
  author    = {Mahmoud Ammar and
               Bruno Crispo and
               Bart Jacobs and
               Danny Hughes and
               Wilfried Daniels},
  title     = {S{\(\mu\)}V - The Security MicroVisor: {A} Formally-Verified Software-Based
               Security Architecture for the Internet of Things},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {5},
  pages     = {885--901},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2019.2928541},
  doi       = {10.1109/TDSC.2019.2928541},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AmmarCJHD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AnandS19,
  author    = {S. Abhishek Anand and
               Nitesh Saxena},
  title     = {Noisy Vibrational Pairing of IoT Devices},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {3},
  pages     = {530--545},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2018.2873372},
  doi       = {10.1109/TDSC.2018.2873372},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AnandS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ArshadFPGA19,
  author    = {Muhammad Umer Arshad and
               Muhamad Felemban and
               Zahid Pervaiz and
               Arif Ghafoor and
               Walid G. Aref},
  title     = {A Privacy Mechanism for Access Controlled Graph Data},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {5},
  pages     = {819--832},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2714660},
  doi       = {10.1109/TDSC.2017.2714660},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ArshadFPGA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AydayTY19,
  author    = {Erman Ayday and
               Qiang Tang and
               Arif Yilmaz},
  title     = {Cryptographic Solutions for Credibility and Liability Issues of Genomic
               Data},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {1},
  pages     = {33--43},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2690422},
  doi       = {10.1109/TDSC.2017.2690422},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AydayTY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BaoS19,
  author    = {Chongxi Bao and
               Ankur Srivastava},
  title     = {Reducing Timing Side-Channel Information Leakage Using 3D Integration},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {4},
  pages     = {665--678},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2712156},
  doi       = {10.1109/TDSC.2017.2712156},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BaoS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BaracaldoPJ19,
  author    = {Nathalie Baracaldo and
               Balaji Palanisamy and
               James Joshi},
  title     = {{G-SIR:} An Insider Attack Resilient Geo-Social Access Control Framework},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {1},
  pages     = {84--98},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2654438},
  doi       = {10.1109/TDSC.2017.2654438},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BaracaldoPJ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Becker19,
  author    = {Georg T. Becker},
  title     = {Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited:
               Theory versus Practice},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {5},
  pages     = {783--795},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2762675},
  doi       = {10.1109/TDSC.2017.2762675},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Becker19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CalderS19,
  author    = {Muffy Calder and
               Michele Sevegnani},
  title     = {Stochastic Model Checking for Predicting Component Failures and Service
               Availability},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {1},
  pages     = {174--187},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2650901},
  doi       = {10.1109/TDSC.2017.2650901},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CalderS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CaoWZ19,
  author    = {Zhenfu Cao and
               Hongbing Wang and
               Yunlei Zhao},
  title     = {{AP-PRE:} Autonomous Path Proxy Re-Encryption and Its Applications},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {5},
  pages     = {833--842},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2714166},
  doi       = {10.1109/TDSC.2017.2714166},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CaoWZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChangDRT19,
  author    = {Chip{-}Hong Chang and
               Marten van Dijk and
               Ulrich R{\"{u}}hrmair and
               Mark Mohammad Tehranipoor},
  title     = {Emerging Attacks and Solutions for Secure Hardware in the Internet
               of Things},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {3},
  pages     = {373--375},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2019.2901048},
  doi       = {10.1109/TDSC.2019.2901048},
  timestamp = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChangDRT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChangGMS19,
  author    = {Akshima and
               Donghoon Chang and
               Aarushi Goel and
               Sweta Mishra and
               Somitra Kumar Sanadhya},
  title     = {Generation of Secure and Reliable Honeywords, Preventing False Detection},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {5},
  pages     = {757--769},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2018.2824323},
  doi       = {10.1109/TDSC.2018.2824323},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChangGMS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChaseNWCK19,
  author    = {Jonathan Chase and
               Dusit Niyato and
               Ping Wang and
               Sivadon Chaisiri and
               Ryan K. L. Ko},
  title     = {A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service
               Provisioning in Cloud Computing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {4},
  pages     = {565--579},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2703626},
  doi       = {10.1109/TDSC.2017.2703626},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChaseNWCK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChatterjeeGSMCM19,
  author    = {Urbi Chatterjee and
               Vidya Govindan and
               Rajat Sadhukhan and
               Debdeep Mukhopadhyay and
               Rajat Subhra Chakraborty and
               Debashis Mahata and
               Mukesh M. Prabhu},
  title     = {Building {PUF} Based Authentication and Key Exchange Protocol for
               IoT Without Explicit CRPs in Verifier Database},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {3},
  pages     = {424--437},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2018.2832201},
  doi       = {10.1109/TDSC.2018.2832201},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChatterjeeGSMCM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChenSLQZ19,
  author    = {Qingjun Chen and
               Shouqian Shi and
               Xin Li and
               Chen Qian and
               Sheng Zhong},
  title     = {SDN-Based Privacy Preserving Cross Domain Routing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {6},
  pages     = {930--943},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2018.2811807},
  doi       = {10.1109/TDSC.2018.2811807},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChenSLQZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CockDHKNPT19,
  author    = {Martine De Cock and
               Rafael Dowsley and
               Caleb Horst and
               Raj S. Katti and
               Anderson C. A. Nascimento and
               Wing{-}Sea Poon and
               Stacey Truex},
  title     = {Efficient and Private Scoring of Decision Trees, Support Vector Machines
               and Logistic Regression Models Based on Pre-Computation},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {2},
  pages     = {217--230},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2679189},
  doi       = {10.1109/TDSC.2017.2679189},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CockDHKNPT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CotaMGDLMB19,
  author    = {Guido Lena Cota and
               Sonia Ben Mokhtar and
               Gabriele Gianini and
               Ernesto Damiani and
               Julia Lawall and
               Gilles Muller and
               Lionel Brunie},
  title     = {{RACOON++:} {A} Semi-Automatic Framework for the Selfishness-Aware
               Design of Cooperative Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {4},
  pages     = {635--650},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2706286},
  doi       = {10.1109/TDSC.2017.2706286},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CotaMGDLMB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CotroneoPP19,
  author    = {Domenico Cotroneo and
               Andrea Paudice and
               Antonio Pecchia},
  title     = {Empirical Analysis and Validation of Security Alerts Filtering Techniques},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {5},
  pages     = {856--870},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2714164},
  doi       = {10.1109/TDSC.2017.2714164},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CotroneoPP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DemontisMBMARCG19,
  author    = {Ambra Demontis and
               Marco Melis and
               Battista Biggio and
               Davide Maiorca and
               Daniel Arp and
               Konrad Rieck and
               Igino Corona and
               Giorgio Giacinto and
               Fabio Roli},
  title     = {Yes, Machine Learning Can Be More Secure! {A} Case Study on Android
               Malware Detection},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {4},
  pages     = {711--724},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2700270},
  doi       = {10.1109/TDSC.2017.2700270},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/DemontisMBMARCG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DingLJ19,
  author    = {Xiaofeng Ding and
               Peng Liu and
               Hai Jin},
  title     = {Privacy-Preserving Multi-Keyword Top-{\textdollar}k{\textdollar} k
               Similarity Search Over Encrypted Data},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {2},
  pages     = {344--357},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2693969},
  doi       = {10.1109/TDSC.2017.2693969},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/DingLJ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FarbehMZM19,
  author    = {Hamed Farbeh and
               Fereshte Mozafari and
               Masoume Zabihi and
               Seyed Ghassem Miremadi},
  title     = {RAW-Tag: Replicating in Altered Cache Ways for Correcting Multiple-Bit
               Errors in Tag Array},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {4},
  pages     = {651--664},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2706263},
  doi       = {10.1109/TDSC.2017.2706263},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/FarbehMZM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FuLYYYZ19,
  author    = {Cai Fu and
               Xiao{-}Yang Liu and
               Jia Yang and
               Laurence T. Yang and
               Shui Yu and
               Tianqing Zhu},
  title     = {Wormhole: The Hidden Virus Propagation Power of the Search Engine
               in Social Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {4},
  pages     = {693--710},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2703887},
  doi       = {10.1109/TDSC.2017.2703887},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/FuLYYYZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FyrbiakWSHHWWTP19,
  author    = {Marc Fyrbiak and
               Sebastian Wallat and
               Pawel Swierczynski and
               Max Hoffmann and
               Sebastian Hoppach and
               Matthias Wilhelm and
               Tobias Weidlich and
               Russell Tessier and
               Christof Paar},
  title     = {{HAL} - The Missing Piece of the Puzzle for Hardware Reverse Engineering,
               Trojan Detection and Insertion},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {3},
  pages     = {498--510},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2018.2812183},
  doi       = {10.1109/TDSC.2018.2812183},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/FyrbiakWSHHWWTP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuanCLXGZYJ19,
  author    = {Le Guan and
               Chen Cao and
               Peng Liu and
               Xinyu Xing and
               Xinyang Ge and
               Shengzhi Zhang and
               Meng Yu and
               Trent Jaeger},
  title     = {Building a Trustworthy Execution Environment to Defeat Exploits from
               both Cyber Space and Physical Space for {ARM}},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {3},
  pages     = {438--453},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2018.2861756},
  doi       = {10.1109/TDSC.2018.2861756},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/GuanCLXGZYJ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HaiderJASKD19,
  author    = {Syed Kamran Haider and
               Chenglu Jin and
               Masab Ahmad and
               Devu Manikantan Shila and
               Omer Khan and
               Marten van Dijk},
  title     = {Advancing the State-of-the-Art in Hardware Trojans Detection},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {1},
  pages     = {18--32},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2654352},
  doi       = {10.1109/TDSC.2017.2654352},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HaiderJASKD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HanHW19,
  author    = {Xiao Han and
               Hailiang Huang and
               Leye Wang},
  title     = {{F-PAD:} Private Attribute Disclosure Risk Estimation in Online Social
               Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {6},
  pages     = {1054--1069},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2019.2934096},
  doi       = {10.1109/TDSC.2019.2934096},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HanHW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JalaliAKJ19,
  author    = {Amir Jalali and
               Reza Azarderakhsh and
               Mehran Mozaffari Kermani and
               David Jao},
  title     = {Supersingular Isogeny Diffie-Hellman Key Exchange on 64-Bit {ARM}},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {5},
  pages     = {902--912},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2723891},
  doi       = {10.1109/TDSC.2017.2723891},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/JalaliAKJ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JiWCLMB19,
  author    = {Shouling Ji and
               Ting Wang and
               Jianhai Chen and
               Weiqing Li and
               Prateek Mittal and
               Raheem Beyah},
  title     = {De-SAG: On the De-Anonymization of Structure-Attribute Graph Data},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {4},
  pages     = {594--607},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2712150},
  doi       = {10.1109/TDSC.2017.2712150},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/JiWCLMB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JinD19,
  author    = {Chenglu Jin and
               Marten van Dijk},
  title     = {Secure and Efficient Initialization and Authentication Protocols for
               {SHIELD}},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {1},
  pages     = {156--173},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2647950},
  doi       = {10.1109/TDSC.2017.2647950},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/JinD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JurcutCD19,
  author    = {Anca Jurcut and
               Tom Coffey and
               Reiner Dojen},
  title     = {A Novel Security Protocol Attack Detection Logic with Unique Fault
               Discovery Capability for Freshness Attacks and Interleaving Session
               Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {6},
  pages     = {969--983},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2725831},
  doi       = {10.1109/TDSC.2017.2725831},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/JurcutCD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KappesHA19,
  author    = {Giorgos Kappes and
               Andromachi Hatzieleftheriou and
               Stergios V. Anastasiadis},
  title     = {Multitenant Access Control for Cloud-Aware Distributed Filesystems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {6},
  pages     = {1070--1085},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2715839},
  doi       = {10.1109/TDSC.2017.2715839},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KappesHA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Karyotis19,
  author    = {Vasileios Karyotis},
  title     = {A Markov Random Field Framework for Modeling Malware Propagation in
               Complex Communications Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {4},
  pages     = {551--564},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2703622},
  doi       = {10.1109/TDSC.2017.2703622},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Karyotis19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KimLLTW19,
  author    = {Myungsun Kim and
               Hyung Tae Lee and
               San Ling and
               Benjamin Hong Meng Tan and
               Huaxiong Wang},
  title     = {Private Compound Wildcard Queries Using Fully Homomorphic Encryption},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {5},
  pages     = {743--756},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2763593},
  doi       = {10.1109/TDSC.2017.2763593},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KimLLTW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LaiCCS19,
  author    = {Russell W. F. Lai and
               Kam{-}Fung Cheung and
               Sherman S. M. Chow and
               Anthony Man{-}Cho So},
  title     = {Another Look at Anonymous Communication},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {5},
  pages     = {731--742},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2018.2828002},
  doi       = {10.1109/TDSC.2018.2828002},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LaiCCS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LanXZZ19,
  author    = {Xiao Lan and
               Jing Xu and
               Zhen{-}Feng Zhang and
               Wen{-}Tao Zhu},
  title     = {Investigating the Multi-Ciphersuite and Backwards-Compatibility Security
               of the Upcoming {TLS} 1.3},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {2},
  pages     = {272--286},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2685382},
  doi       = {10.1109/TDSC.2017.2685382},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LanXZZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LeeMHJJKPK19,
  author    = {Hojoon Lee and
               Hyungon Moon and
               Ingoo Heo and
               DaeHee Jang and
               Jinsoo Jang and
               Kihwan Kim and
               Yunheung Paek and
               Brent ByungHoon Kang},
  title     = {KI-Mon {ARM:} {A} Hardware-Assisted Event-triggered Monitoring Platform
               for Mutable Kernel Object},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {2},
  pages     = {287--300},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2679710},
  doi       = {10.1109/TDSC.2017.2679710},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LeeMHJJKPK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LevitinXD19,
  author    = {Gregory Levitin and
               Liudong Xing and
               Yuanshun Dai},
  title     = {Optimal Spot-Checking for Collusion Tolerance in Computer Grids},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {2},
  pages     = {301--312},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2690293},
  doi       = {10.1109/TDSC.2017.2690293},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LevitinXD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiLGLGGLL19,
  author    = {Wei Li and
               Linfeng Liao and
               Dawu Gu and
               Chaoyun Li and
               Chenyu Ge and
               Zheng Guo and
               Ya Liu and
               Zhiqiang Liu},
  title     = {Ciphertext-Only Fault Analysis on the {LED} Lightweight Cryptosystem
               in the Internet of Things},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {3},
  pages     = {454--461},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2018.2857770},
  doi       = {10.1109/TDSC.2018.2857770},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiLGLGGLL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiSW19,
  author    = {Huiyun Li and
               Cuiping Shao and
               Zheng Wang},
  title     = {Detecting Fault Injection Attacks Based on Compressed Sensing and
               Integer Linear Programming},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {3},
  pages     = {476--483},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2018.2821140},
  doi       = {10.1109/TDSC.2018.2821140},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiSW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiYMSNC19,
  author    = {Yannan Li and
               Yong Yu and
               Geyong Min and
               Willy Susilo and
               Jianbing Ni and
               Kim{-}Kwang Raymond Choo},
  title     = {Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage
               Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {1},
  pages     = {72--83},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2662216},
  doi       = {10.1109/TDSC.2017.2662216},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiYMSNC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiZHZL19,
  author    = {Qi Li and
               Xiaoyue Zou and
               Qun Huang and
               Jing Zheng and
               Patrick P. C. Lee},
  title     = {Dynamic Packet Forwarding Verification in {SDN}},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {6},
  pages     = {915--929},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2018.2810880},
  doi       = {10.1109/TDSC.2018.2810880},
  timestamp = {Fri, 29 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiZHZL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiaoSFB19,
  author    = {Xiaojing Liao and
               Preethi Srinivasan and
               David Formby and
               Raheem A. Beyah},
  title     = {Di-PriDA: Differentially Private Distributed Load Balancing Control
               for the Smart Grid},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {6},
  pages     = {1026--1039},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2717826},
  doi       = {10.1109/TDSC.2017.2717826},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiaoSFB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LinXCHW19,
  author    = {Limei Lin and
               Li Xu and
               Riqing Chen and
               Sun{-}Yuan Hsieh and
               Dajin Wang},
  title     = {Relating Extra Connectivity and Extra Conditional Diagnosability in
               Regular Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {6},
  pages     = {1086--1097},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2726541},
  doi       = {10.1109/TDSC.2017.2726541},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LinXCHW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuSCCK19,
  author    = {Zhe Liu and
               Hwajeong Seo and
               Aniello Castiglione and
               Kim{-}Kwang Raymond Choo and
               Howon Kim},
  title     = {Memory-Efficient Implementation of Elliptic Curve Cryptography for
               the Internet-of-Things},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {3},
  pages     = {521--529},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2018.2825449},
  doi       = {10.1109/TDSC.2018.2825449},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiuSCCK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LorekZK19,
  author    = {Pawel Lorek and
               Filip Zag{\'{o}}rski and
               Michal Kulis},
  title     = {Strong Stationary Times and its use in Cryptography},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {5},
  pages     = {805--818},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2751475},
  doi       = {10.1109/TDSC.2017.2751475},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LorekZK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaeneGMCFV19,
  author    = {Pieter Maene and
               Johannes G{\"{o}}tzfried and
               Tilo M{\"{u}}ller and
               Ruan de Clercq and
               Felix C. Freiling and
               Ingrid Verbauwhede},
  title     = {Atlas: Application Confidentiality in Compromised Embedded Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {3},
  pages     = {415--423},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2018.2858257},
  doi       = {10.1109/TDSC.2018.2858257},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MaeneGMCFV19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MahmoudRSOISQ19,
  author    = {Mohamed Mahmoud and
               Khaled Rabieh and
               Ahmed B. T. Sherif and
               Enahoro Oriero and
               Muhammad Ismail and
               Erchin Serpedin and
               Khalid A. Qaraqe},
  title     = {Privacy-Preserving Fine-Grained Data Retrieval Schemes for Mobile
               Social Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {5},
  pages     = {871--884},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2714162},
  doi       = {10.1109/TDSC.2017.2714162},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MahmoudRSOISQ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MisraTNMMH19,
  author    = {Satyajayant Misra and
               Reza Tourani and
               Frank Natividad and
               Travis Mick and
               Nahid Ebrahimi Majd and
               Hong Huang},
  title     = {AccConF: An Access Control Framework for Leveraging In-Network Cached
               Data in the ICN-Enabled Wireless Edge},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {1},
  pages     = {5--17},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2672991},
  doi       = {10.1109/TDSC.2017.2672991},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MisraTNMMH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MitropoulosLPK19,
  author    = {Dimitris Mitropoulos and
               Panos Louridas and
               Michalis Polychronakis and
               Angelos Dennis Keromytis},
  title     = {Defending Against Web Application Attacks: Approaches, Challenges
               and Implications},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {2},
  pages     = {188--203},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2665620},
  doi       = {10.1109/TDSC.2017.2665620},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MitropoulosLPK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Munoz-GonzalezS19,
  author    = {Luis Munoz{-}Gonzalez and
               Daniele Sgandurra and
               Mart{\'{\i}}n Barr{\`{e}}re and
               Emil C. Lupu},
  title     = {Exact Inference Techniques for the Analysis of Bayesian Attack Graphs},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {2},
  pages     = {231--244},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2016.2627033},
  doi       = {10.1109/TDSC.2016.2627033},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Munoz-GonzalezS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/OsadchyD19,
  author    = {Margarita Osadchy and
               Orr Dunkelman},
  title     = {It is All in the System's Parameters: Privacy and Security Issues
               in Transforming Biometric Raw Data into Binary Strings},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {5},
  pages     = {796--804},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2018.2804949},
  doi       = {10.1109/TDSC.2018.2804949},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/OsadchyD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PalGPH19,
  author    = {Ranjan Pal and
               Leana Golubchik and
               Konstantinos Psounis and
               Pan Hui},
  title     = {Security Pricing as Enabler of Cyber-Insurance {A} First Look at Differentiated
               Pricing Markets},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {2},
  pages     = {358--372},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2684801},
  doi       = {10.1109/TDSC.2017.2684801},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PalGPH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PammuCWG19,
  author    = {Ali Akbar Pammu and
               Kwen{-}Siong Chong and
               Yi Wang and
               Bah{-}Hwee Gwee},
  title     = {A Highly Efficient Side Channel Attack with Profiling through Relevance-Learning
               on Physical Leakage Information},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {3},
  pages     = {376--387},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2018.2864727},
  doi       = {10.1109/TDSC.2018.2864727},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/PammuCWG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PengWZWWYN19,
  author    = {Sancheng Peng and
               Guojun Wang and
               Yongmei Zhou and
               Cong Wan and
               Cong Wang and
               Shui Yu and
               Jianwei Niu},
  title     = {An Immunization Framework for Social Networks Through Big Data Based
               Influence Modeling},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {6},
  pages     = {984--995},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2731844},
  doi       = {10.1109/TDSC.2017.2731844},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PengWZWWYN19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PhanY19,
  author    = {Raphael C.{-}W. Phan and
               Moti Yung},
  title     = {Paradigm Shifts in Cryptographic Engineering},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {5},
  pages     = {729--730},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2019.2934527},
  doi       = {10.1109/TDSC.2019.2934527},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PhanY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PisharodyNCAH19,
  author    = {Sandeep Pisharody and
               Janakarajan Natarajan and
               Ankur Chowdhary and
               Abdullah Alshalan and
               Dijiang Huang},
  title     = {Brew: {A} Security Policy Analysis Framework for Distributed SDN-Based
               Cloud Environments},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {6},
  pages     = {1011--1025},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2726066},
  doi       = {10.1109/TDSC.2017.2726066},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PisharodyNCAH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PopeTK19,
  author    = {Aaron S. Pope and
               Daniel R. Tauritz and
               Alexander D. Kent},
  title     = {Evolving Bipartite Authentication Graph Partitions},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {1},
  pages     = {58--71},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2652469},
  doi       = {10.1109/TDSC.2017.2652469},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PopeTK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/QianLZCJH19,
  author    = {Jianwei Qian and
               Xiang{-}Yang Li and
               Chunhong Zhang and
               Linlin Chen and
               Taeho Jung and
               Junze Han},
  title     = {Social Network De-Anonymization and Privacy Inference with Knowledge
               Graph Model},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {4},
  pages     = {679--692},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2697854},
  doi       = {10.1109/TDSC.2017.2697854},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/QianLZCJH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RabiiNK19,
  author    = {Hila Rabii and
               Yaara Neumeier and
               Osnat Keren},
  title     = {High Rate Robust Codes with Low Implementation Complexity},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {3},
  pages     = {511--520},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2018.2816638},
  doi       = {10.1109/TDSC.2018.2816638},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RabiiNK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Rao19,
  author    = {Fang{-}Yu Rao},
  title     = {On the Security of a Variant of ElGamal Encryption Scheme},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {4},
  pages     = {725--728},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2707085},
  doi       = {10.1109/TDSC.2017.2707085},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Rao19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RenFKDD19,
  author    = {Ling Ren and
               Christopher W. Fletcher and
               Albert Kwon and
               Marten van Dijk and
               Srinivas Devadas},
  title     = {Design and Implementation of the Ascend Secure Processor},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {2},
  pages     = {204--216},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2687463},
  doi       = {10.1109/TDSC.2017.2687463},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RenFKDD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SchallerXASGSKS19,
  author    = {Andr{\'{e}} Schaller and
               Wenjie Xiong and
               Nikolaos Athanasios Anagnostopoulos and
               Muhammad Umair Saleem and
               Sebastian Gabmeyer and
               Boris Skoric and
               Stefan Katzenbeisser and
               Jakub Szefer},
  title     = {Decay-Based {DRAM} PUFs in Commodity Devices},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {3},
  pages     = {462--475},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2018.2822298},
  doi       = {10.1109/TDSC.2018.2822298},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SchallerXASGSKS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SeiOTO19,
  author    = {Yuichi Sei and
               Hiroshi Okumura and
               Takao Takenouchi and
               Akihiko Ohsuga},
  title     = {Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {4},
  pages     = {580--593},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2698472},
  doi       = {10.1109/TDSC.2017.2698472},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SeiOTO19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShenWLXZHR19,
  author    = {Yiran Shen and
               Hongkai Wen and
               Chengwen Luo and
               Weitao Xu and
               Tao Zhang and
               Wen Hu and
               Daniela Rus},
  title     = {GaitLock: Protect Virtual and Augmented Reality Headsets Using Gait},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {3},
  pages     = {484--497},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2018.2800048},
  doi       = {10.1109/TDSC.2018.2800048},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/ShenWLXZHR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShenZHZSX19,
  author    = {Jian Shen and
               Tianqi Zhou and
               Debiao He and
               Yuexin Zhang and
               Xingming Sun and
               Yang Xiang},
  title     = {Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {6},
  pages     = {996--1010},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2725953},
  doi       = {10.1109/TDSC.2017.2725953},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ShenZHZSX19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShirvanianSJK19,
  author    = {Maliheh Shirvanian and
               Nitesh Saxena and
               Stanislaw Jarecki and
               Hugo Krawczyk},
  title     = {Building and Studying a Password Store that Perfectly Hides Passwords
               from Itself},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {5},
  pages     = {770--782},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2019.2902551},
  doi       = {10.1109/TDSC.2019.2902551},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ShirvanianSJK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Vaidya19,
  author    = {Jaideep Vaidya},
  title     = {Editorial},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {1},
  pages     = {1--4},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2018.2884156},
  doi       = {10.1109/TDSC.2018.2884156},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Vaidya19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangLX19,
  author    = {Boyang Wang and
               Ming Li and
               Li Xiong},
  title     = {FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {2},
  pages     = {245--258},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2684802},
  doi       = {10.1109/TDSC.2017.2684802},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangLX19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangQ19,
  author    = {Qian Wang and
               Gang Qu},
  title     = {A Silicon {PUF} Based Entropy Pump},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {3},
  pages     = {402--414},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2018.2881695},
  doi       = {10.1109/TDSC.2018.2881695},
  timestamp = {Wed, 25 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangQ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangQWCZ19,
  author    = {Xiaoguang Wang and
               Yong Qi and
               Zhi Wang and
               Yue Chen and
               Yajin Zhou},
  title     = {Design and Implementation of SecPod, {A} Framework for Virtualization-Based
               Security Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {1},
  pages     = {44--57},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2675991},
  doi       = {10.1109/TDSC.2017.2675991},
  timestamp = {Wed, 19 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangQWCZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangWLYZY19,
  author    = {Juan Wang and
               Ru Wen and
               Jiangqi Li and
               Fei Yan and
               Bo Zhao and
               Fajiang Yu},
  title     = {Detecting and Mitigating Target Link-Flooding Attacks Using {SDN}},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {6},
  pages     = {944--956},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2018.2822275},
  doi       = {10.1109/TDSC.2018.2822275},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangWLYZY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangXWXXT19,
  author    = {Tianbo Wang and
               Chunhe Xia and
               Sheng Wen and
               Hui Xue and
               Yang Xiang and
               Shouzhong Tu},
  title     = {{SADI:} {A} Novel Model to Study the Propagation of Social Worms in
               Hierarchical Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {1},
  pages     = {142--155},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2651826},
  doi       = {10.1109/TDSC.2017.2651826},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangXWXXT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WuchnerCOP19,
  author    = {Tobias W{\"{u}}chner and
               Aleksander Cislak and
               Mart{\'{\i}}n Ochoa and
               Alexander Pretschner},
  title     = {Leveraging Compression-Based Graph Mining for Behavior-Based Malware
               Detection},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {1},
  pages     = {99--112},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2675881},
  doi       = {10.1109/TDSC.2017.2675881},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WuchnerCOP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XiangLF19,
  author    = {Dong Xiang and
               Bing Li and
               Yi Fu},
  title     = {Fault-Tolerant Adaptive Routing in Dragonfly Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {2},
  pages     = {259--271},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2693372},
  doi       = {10.1109/TDSC.2017.2693372},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/XiangLF19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YangSG19,
  author    = {Yingyuan Yang and
               Jinyuan Sun and
               Linke Guo},
  title     = {PersonaIA: {A} Lightweight Implicit Authentication System Based on
               Customized User Behavior Selection},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {1},
  pages     = {113--126},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2016.2645208},
  doi       = {10.1109/TDSC.2016.2645208},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/YangSG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YilmazFAA19,
  author    = {Emre Yilmaz and
               Hakan Ferhatosmanoglu and
               Erman Ayday and
               Remzi Can Aksoy},
  title     = {Privacy-Preserving Aggregate Queries for Optimal Location Selection},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {2},
  pages     = {329--343},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2693986},
  doi       = {10.1109/TDSC.2017.2693986},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/YilmazFAA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YuceDGBNS19,
  author    = {Bilgiday Yuce and
               Chinmay Deshpande and
               Marjan Ghodrati and
               Abhishek Bendre and
               Leyla Nazhandali and
               Patrick Schaumont},
  title     = {A Secure Exception Mode for Fault-Attack-Resistant Processing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {3},
  pages     = {388--401},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2018.2823767},
  doi       = {10.1109/TDSC.2018.2823767},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/YuceDGBNS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangDFL19,
  author    = {Liwei Zhang and
               A. Adam Ding and
               Yunsi Fei and
               Pei Luo},
  title     = {Efficient Nonprofiling 2nd-Order Power Analysis on Masked Devices
               Utilizing Multiple Leakage Points},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {5},
  pages     = {843--855},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2715019},
  doi       = {10.1109/TDSC.2017.2715019},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhangDFL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangXSM19,
  author    = {Rui Zhang and
               Yuting Xiao and
               Shuzhou Sun and
               Hui Ma},
  title     = {Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile
               Communications},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {4},
  pages     = {625--634},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2700305},
  doi       = {10.1109/TDSC.2017.2700305},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhangXSM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhaoSZL19,
  author    = {Yongwang Zhao and
               David San{\'{a}}n and
               Fuyuan Zhang and
               Yang Liu},
  title     = {Refinement-Based Specification and Security Analysis of Separation
               Kernels},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {16},
  number    = {1},
  pages     = {127--141},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2672983},
  doi       = {10.1109/TDSC.2017.2672983},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhaoSZL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AdithamR18,
  author    = {Santosh Aditham and
               Nagarajan Ranganathan},
  title     = {A System Architecture for the Detection of Insider Attacks in Big
               Data Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {6},
  pages     = {974--987},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2017.2768533},
  doi       = {10.1109/TDSC.2017.2768533},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AdithamR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AitzhanS18,
  author    = {Nurzhan Zhumabekuly Aitzhan and
               Davor Svetinovic},
  title     = {Security and Privacy in Decentralized Energy Trading Through Multi-Signatures,
               Blockchain and Anonymous Messaging Streams},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {5},
  pages     = {840--852},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2616861},
  doi       = {10.1109/TDSC.2016.2616861},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AitzhanS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AlRubaianAHA18,
  author    = {Majed A. AlRubaian and
               Muhammad Al{-}Qurishi and
               Mohammad Mehedi Hassan and
               Atif Alamri},
  title     = {A Credibility Analysis System for Assessing Information on Twitter},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {4},
  pages     = {661--674},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2602338},
  doi       = {10.1109/TDSC.2016.2602338},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AlRubaianAHA18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AlchieriBGF18,
  author    = {Eduardo Ad{\'{\i}}lio Pelinson Alchieri and
               Alysson Bessani and
               Fab{\'{\i}}ola Greve and
               Joni da Silva Fraga},
  title     = {Knowledge Connectivity Requirements for Solving Byzantine Consensus
               with Unknown Participants},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {2},
  pages     = {246--259},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2548460},
  doi       = {10.1109/TDSC.2016.2548460},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AlchieriBGF18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BasinCKPSS18,
  author    = {David A. Basin and
               Cas Cremers and
               Tiffany Hyun{-}Jin Kim and
               Adrian Perrig and
               Ralf Sasse and
               Pawel Szalachowski},
  title     = {Design, Analysis, and Implementation of {ARPKI:} An Attack-Resilient
               Public-Key Infrastructure},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {3},
  pages     = {393--408},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2601610},
  doi       = {10.1109/TDSC.2016.2601610},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BasinCKPSS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BikosS18,
  author    = {Anastasios N. Bikos and
               Nicolas Sklavos},
  title     = {Architecture Design of an Area Efficient High Speed Crypto Processor
               for 4G {LTE}},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {5},
  pages     = {729--741},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2620437},
  doi       = {10.1109/TDSC.2016.2620437},
  timestamp = {Fri, 15 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/BikosS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BogdanovKLS18,
  author    = {Dan Bogdanov and
               Liina Kamm and
               Sven Laur and
               Ville Sokk},
  title     = {Rmind: {A} Tool for Cryptographically Secure Statistical Analysis},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {3},
  pages     = {481--495},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2587623},
  doi       = {10.1109/TDSC.2016.2587623},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BogdanovKLS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Bou-HarbAD18,
  author    = {Elias Bou{-}Harb and
               Chadi Assi and
               Mourad Debbabi},
  title     = {CSC-Detector: {A} System to Infer Large-Scale Probing Campaigns},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {3},
  pages     = {364--377},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2593441},
  doi       = {10.1109/TDSC.2016.2593441},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Bou-HarbAD18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CaiHGL18,
  author    = {Zhipeng Cai and
               Zaobo He and
               Xin Guan and
               Yingshu Li},
  title     = {Collective Data-Sanitization for Preventing Sensitive Information
               Inference Attacks in Social Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {4},
  pages     = {577--590},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2613521},
  doi       = {10.1109/TDSC.2016.2613521},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CaiHGL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChangH18,
  author    = {Nai{-}Wen Chang and
               Sun{-}Yuan Hsieh},
  title     = {Conditional Diagnosability of (n, k)-Star Graphs Under the {PMC} Model},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {2},
  pages     = {207--216},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2562620},
  doi       = {10.1109/TDSC.2016.2562620},
  timestamp = {Mon, 29 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChangH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChatterjeeRDCKV18,
  author    = {Santanu Chatterjee and
               Sandip Roy and
               Ashok Kumar Das and
               Samiran Chattopadhyay and
               Neeraj Kumar and
               Athanasios V. Vasilakos},
  title     = {Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic
               Map for Multi-Server Environment},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {5},
  pages     = {824--839},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2616876},
  doi       = {10.1109/TDSC.2016.2616876},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChatterjeeRDCKV18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChenQLHL18,
  author    = {Pengfei Chen and
               Yong Qi and
               Xinyi Li and
               Di Hou and
               Michael Rung{-}Tsong Lyu},
  title     = {ARF-Predictor: Effective Prediction of Aging-Related Failure Using
               Entropy},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {4},
  pages     = {675--693},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2604381},
  doi       = {10.1109/TDSC.2016.2604381},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChenQLHL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChoC18,
  author    = {Jin{-}Hee Cho and
               Ing{-}Ray Chen},
  title     = {{PROVEST:} Provenance-Based Trust Model for Delay Tolerant Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {1},
  pages     = {151--165},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2530705},
  doi       = {10.1109/TDSC.2016.2530705},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChoC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CotroneoLN18,
  author    = {Domenico Cotroneo and
               Anna Lanzaro and
               Roberto Natella},
  title     = {Faultprog: Testing the Accuracy of Binary-Level Software Fault Injection},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {1},
  pages     = {40--53},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2522968},
  doi       = {10.1109/TDSC.2016.2522968},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CotroneoLN18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CotroneoPP18,
  author    = {Domenico Cotroneo and
               Karthik Pattabiraman and
               Antonio Pecchia},
  title     = {Guest Editors' Introduction: Special Issue on Data-Driven Dependability
               and Security},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {6},
  pages     = {913--914},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2018.2813891},
  doi       = {10.1109/TDSC.2018.2813891},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CotroneoPP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CresciPPST18,
  author    = {Stefano Cresci and
               Roberto Di Pietro and
               Marinella Petrocchi and
               Angelo Spognardi and
               Maurizio Tesconi},
  title     = {Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired
               Behavioral Modeling},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {4},
  pages     = {561--576},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2017.2681672},
  doi       = {10.1109/TDSC.2017.2681672},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/CresciPPST18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CuiWDWL18,
  author    = {Hui Cui and
               Zhiguo Wan and
               Robert H. Deng and
               Guilin Wang and
               Yingjiu Li},
  title     = {Efficient and Expressive Keyword Search Over Encrypted Data in Cloud},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {3},
  pages     = {409--422},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2599883},
  doi       = {10.1109/TDSC.2016.2599883},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CuiWDWL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/El-SayedS18,
  author    = {Nosayba El{-}Sayed and
               Bianca Schroeder},
  title     = {Understanding Practical Tradeoffs in {HPC} Checkpoint-Scheduling Policies},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {2},
  pages     = {336--350},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2548463},
  doi       = {10.1109/TDSC.2016.2548463},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/El-SayedS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/EvtyushkinEOPAR18,
  author    = {Dmitry Evtyushkin and
               Jesse Elwell and
               Meltem Ozsoy and
               Dmitry Ponomarev and
               Nael B. Abu{-}Ghazaleh and
               Ryan Riley},
  title     = {Flexible Hardware-Managed Isolated Execution: Architecture, Software
               Support and Applications},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {3},
  pages     = {437--451},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2596287},
  doi       = {10.1109/TDSC.2016.2596287},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/EvtyushkinEOPAR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FaghihB18,
  author    = {Fathiyeh Faghih and
               Borzoo Bonakdarpour},
  title     = {Symbolic Synthesis of Timed Models with Strict 2-Phase Fault Recovery},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {3},
  pages     = {526--541},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2596719},
  doi       = {10.1109/TDSC.2016.2596719},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/FaghihB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GarciaNB18,
  author    = {Miguel Garcia and
               Nuno Neves and
               Alysson Bessani},
  title     = {SieveQ: {A} Layered {BFT} Protection System for Critical Services},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {3},
  pages     = {511--525},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2593442},
  doi       = {10.1109/TDSC.2016.2593442},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/GarciaNB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GollG18,
  author    = {Martin Goll and
               Shay Gueron},
  title     = {Randomness Tests in Hostile Environments},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {2},
  pages     = {289--294},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2537799},
  doi       = {10.1109/TDSC.2016.2537799},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/GollG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuanLMLXJ18,
  author    = {Le Guan and
               Jingqiang Lin and
               Ziqiang Ma and
               Bo Luo and
               Luning Xia and
               Jiwu Jing},
  title     = {Copker: {A} Cryptographic Engine Against Cold-Boot Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {5},
  pages     = {742--754},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2631548},
  doi       = {10.1109/TDSC.2016.2631548},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/GuanLMLXJ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuerarMMBPC18,
  author    = {Meriem Guerar and
               Mauro Migliardi and
               Alessio Merlo and
               Mohamed Benmohammed and
               Francesco Palmieri and
               Aniello Castiglione},
  title     = {Using Screen Brightness to Improve Security in Mobile Social Network
               Access},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {4},
  pages     = {621--632},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2601603},
  doi       = {10.1109/TDSC.2016.2601603},
  timestamp = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/GuerarMMBPC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GutierrezKCAGCB18,
  author    = {Christopher N. Gutierrez and
               Taegyu Kim and
               Raffaele Della Corte and
               Jeffrey Avery and
               Dan Goldwasser and
               Marcello Cinque and
               Saurabh Bagchi},
  title     = {Learning from the Ones that Got Away: Detecting New Forms of Phishing
               Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {6},
  pages     = {988--1001},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2018.2864993},
  doi       = {10.1109/TDSC.2018.2864993},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/GutierrezKCAGCB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HanLNGX18,
  author    = {Weili Han and
               Zhigong Li and
               Minyue Ni and
               Guofei Gu and
               Wenyuan Xu},
  title     = {Shadow Attacks Based on Password Reuses: {A} Quantitative Empirical
               Analysis},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {2},
  pages     = {309--320},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2568187},
  doi       = {10.1109/TDSC.2016.2568187},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HanLNGX18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HeKWWCV18,
  author    = {Debiao He and
               Neeraj Kumar and
               Huaqun Wang and
               Lina Wang and
               Kim{-}Kwang Raymond Choo and
               Alexey V. Vinel},
  title     = {A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching
               for Mobile Healthcare Social Network},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {4},
  pages     = {633--645},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2596286},
  doi       = {10.1109/TDSC.2016.2596286},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HeKWWCV18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HeZHLL18,
  author    = {Pinjia He and
               Jieming Zhu and
               Shilin He and
               Jian Li and
               Michael R. Lyu},
  title     = {Towards Automated Log Parsing for Large-Scale Log Data Analysis},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {6},
  pages     = {931--944},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2017.2762673},
  doi       = {10.1109/TDSC.2017.2762673},
  timestamp = {Wed, 13 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HeZHLL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JangCLKLCK18,
  author    = {Jin Soo Jang and
               Changho Choi and
               Jae{-}Hyuk Lee and
               Nohyun Kwak and
               Seongman Lee and
               Yeseul Choi and
               Brent ByungHoon Kang},
  title     = {PrivateZone: Providing a Private Execution Environment Using {ARM}
               TrustZone},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {5},
  pages     = {797--810},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2622261},
  doi       = {10.1109/TDSC.2016.2622261},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/JangCLKLCK18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JhaFMDKKI18,
  author    = {Saurabh Jha and
               Valerio Formicola and
               Catello Di Martino and
               Mark Dalton and
               William T. Kramer and
               Zbigniew Kalbarczyk and
               Ravishankar K. Iyer},
  title     = {Resiliency of {HPC} Interconnects: {A} Case Study of Interconnect
               Failures and Recovery in Blue Waters},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {6},
  pages     = {915--930},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2017.2737537},
  doi       = {10.1109/TDSC.2017.2737537},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/JhaFMDKKI18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JiangWYXZ18,
  author    = {Jiao Jiao Jiang and
               Sheng Wen and
               Shui Yu and
               Yang Xiang and
               Wanlei Zhou},
  title     = {Rumor Source Identification in Social Networks with Time-Varying Topology},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {1},
  pages     = {166--179},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2522436},
  doi       = {10.1109/TDSC.2016.2522436},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/JiangWYXZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JohnsonLEF18,
  author    = {Pontus Johnson and
               Robert Lagerstr{\"{o}}m and
               Mathias Ekstedt and
               Ulrik Franke},
  title     = {Can the Common Vulnerability Scoring System be Trusted? {A} Bayesian
               Analysis},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {6},
  pages     = {1002--1015},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2644614},
  doi       = {10.1109/TDSC.2016.2644614},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/JohnsonLEF18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JungHL18,
  author    = {Taeho Jung and
               Junze Han and
               Xiang{-}Yang Li},
  title     = {{PDA:} Semantically Secure Time-Series Data Analytics with Dynamic
               User Groups},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {2},
  pages     = {260--274},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2577034},
  doi       = {10.1109/TDSC.2016.2577034},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/JungHL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KaminagaYSS18,
  author    = {Masahiro Kaminaga and
               Hideki Yoshikawa and
               Arimitsu Shikoda and
               Toshinori Suzuki},
  title     = {Crashing Modulus Attack on Modular Squaring for Rabin Cryptosystem},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {4},
  pages     = {723--728},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2602352},
  doi       = {10.1109/TDSC.2016.2602352},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KaminagaYSS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KhanAAKZ18,
  author    = {Muhammad Usman Shahid Khan and
               Mazhar Ali and
               Assad Abbas and
               Samee U. Khan and
               Albert Y. Zomaya},
  title     = {Segregating Spammers and Unsolicited Bloggers from Genuine Experts
               on Twitter},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {4},
  pages     = {551--560},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2616879},
  doi       = {10.1109/TDSC.2016.2616879},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KhanAAKZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KimHSJ18,
  author    = {Jun Young Kim and
               Wen Hu and
               Hossein Shafagh and
               Sanjay Jha},
  title     = {{SEDA:} Secure Over-the-Air Code Dissemination Protocol for the Internet
               of Things},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {6},
  pages     = {1041--1054},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2639503},
  doi       = {10.1109/TDSC.2016.2639503},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KimHSJ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KimLLW18,
  author    = {Myungsun Kim and
               Hyung Tae Lee and
               San Ling and
               Huaxiong Wang},
  title     = {On the Efficiency of FHE-Based Private Queries},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {2},
  pages     = {357--363},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2568182},
  doi       = {10.1109/TDSC.2016.2568182},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KimLLW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LalehCF18,
  author    = {Naeimeh Laleh and
               Barbara Carminati and
               Elena Ferrari},
  title     = {Risk Assessment in Social Networks Based on User Anomalous Behaviors},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {2},
  pages     = {295--308},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2540637},
  doi       = {10.1109/TDSC.2016.2540637},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LalehCF18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LeeKLCYLL18,
  author    = {Suchul Lee and
               Sungho Kim and
               Sungil Lee and
               Jaehyuk Choi and
               Hanjun Yoon and
               Dohoon Lee and
               Jun{-}Rak Lee},
  title     = {LARGen: Automatic Signature Generation for Malwares Using Latent Dirichlet
               Allocation},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {5},
  pages     = {771--783},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2609907},
  doi       = {10.1109/TDSC.2016.2609907},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LeeKLCYLL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiHWZ18,
  author    = {Bing Li and
               Dijiang Huang and
               Zhijie Wang and
               Yan Zhu},
  title     = {Attribute-based Access Control for {ICN} Naming Scheme},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {2},
  pages     = {194--206},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2550437},
  doi       = {10.1109/TDSC.2016.2550437},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiHWZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiLXYD18,
  author    = {Yan Li and
               Yingjiu Li and
               Ke Xu and
               Qiang Yan and
               Robert H. Deng},
  title     = {Empirical Study of Face Authentication Systems Under {OSNFD} Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {2},
  pages     = {231--245},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2550459},
  doi       = {10.1109/TDSC.2016.2550459},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiLXYD18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiZDLS18,
  author    = {Huaxin Li and
               Haojin Zhu and
               Suguo Du and
               Xiaohui Liang and
               Xuemin Sherman Shen},
  title     = {Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks
               and Defense},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {4},
  pages     = {646--660},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2604383},
  doi       = {10.1109/TDSC.2016.2604383},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiZDLS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiZWLLZ18,
  author    = {Xingxin Li and
               Youwen Zhu and
               Jian Wang and
               Zhe Liu and
               Yining Liu and
               Mingwu Zhang},
  title     = {On the Soundness and Security of Privacy-Preserving {SVM} for Outsourcing
               Data Classification},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {5},
  pages     = {906--912},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2017.2682244},
  doi       = {10.1109/TDSC.2017.2682244},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiZWLLZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LinXWZ18,
  author    = {Limei Lin and
               Li Xu and
               Dajin Wang and
               Shuming Zhou},
  title     = {The g-Good-Neighbor Conditional Diagnosability of Arrangement Graphs},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {3},
  pages     = {542--548},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2593446},
  doi       = {10.1109/TDSC.2016.2593446},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LinXWZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuCDLW18,
  author    = {Ximeng Liu and
               Kim{-}Kwang Raymond Choo and
               Robert H. Deng and
               Rongxing Lu and
               Jian Weng},
  title     = {Efficient and Privacy-Preserving Outsourced Calculation of Rational
               Numbers},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {1},
  pages     = {27--39},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2536601},
  doi       = {10.1109/TDSC.2016.2536601},
  timestamp = {Tue, 12 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiuCDLW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuZGZLW18,
  author    = {Bo Liu and
               Wanlei Zhou and
               Longxiang Gao and
               Haibo Zhou and
               Tom H. Luan and
               Sheng Wen},
  title     = {Malware Propagations in Wireless Ad Hoc Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {6},
  pages     = {1016--1026},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2642191},
  doi       = {10.1109/TDSC.2016.2642191},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiuZGZLW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Lumbiarres-Lopez18,
  author    = {Ruben Lumbiarres{-}Lopez and
               Mariano L{\'{o}}pez{-}Garc{\'{\i}}a and
               Enrique F. Cant{\'{o}}{-}Navarro},
  title     = {Hardware Architecture Implemented on {FPGA} for Protecting Cryptographic
               Keys against Side-Channel Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {5},
  pages     = {898--905},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2610966},
  doi       = {10.1109/TDSC.2016.2610966},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Lumbiarres-Lopez18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MachidaXT18,
  author    = {Fumio Machida and
               Ruofan Xia and
               Kishor S. Trivedi},
  title     = {Performability Modeling for {RAID} Storage Systems by Markov Regenerative
               Process},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {1},
  pages     = {138--150},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2015.2502240},
  doi       = {10.1109/TDSC.2015.2502240},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MachidaXT18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MengL18,
  author    = {Xianfu Meng and
               Dongxu Liu},
  title     = {GeTrust: {A} Guarantee-Based Trust Model in Chord-Based {P2P} Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {1},
  pages     = {54--68},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2530720},
  doi       = {10.1109/TDSC.2016.2530720},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MengL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MoXD18,
  author    = {Yuchang Mo and
               Liudong Xing and
               Joanne Bechta Dugan},
  title     = {Performability Analysis of k-to-l-Out-of-n Computing Systems Using
               Binary Decision Diagrams},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {1},
  pages     = {126--137},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2015.2504092},
  doi       = {10.1109/TDSC.2015.2504092},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MoXD18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MustafaXSS18,
  author    = {Hossen A. Mustafa and
               Wenyuan Xu and
               Ahmad{-}Reza Sadeghi and
               Steffen Schulz},
  title     = {End-to-End Detection of Caller {ID} Spoofing Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {3},
  pages     = {423--436},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2580509},
  doi       = {10.1109/TDSC.2016.2580509},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MustafaXSS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NingCDW18,
  author    = {Jianting Ning and
               Zhenfu Cao and
               Xiaolei Dong and
               Lifei Wei},
  title     = {White-Box Traceable {CP-ABE} for Cloud Storage Service: How to Catch
               People Leaking Their Access Credentials Effectively},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {5},
  pages     = {883--897},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2608343},
  doi       = {10.1109/TDSC.2016.2608343},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/NingCDW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NourianM18,
  author    = {Arash Nourian and
               Stuart E. Madnick},
  title     = {A Systems Theoretic Approach to the Security Threats in Cyber Physical
               Systems Applied to Stuxnet},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {1},
  pages     = {2--13},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2015.2509994},
  doi       = {10.1109/TDSC.2015.2509994},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/NourianM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NovotnyKW18,
  author    = {Petr Novotn{\'{y}} and
               Bong{-}Jun Ko and
               Alexander L. Wolf},
  title     = {Locating Faults in MANET-Hosted Software Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {3},
  pages     = {452--465},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2596284},
  doi       = {10.1109/TDSC.2016.2596284},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/NovotnyKW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/QianZZZ18,
  author    = {Zhenxing Qian and
               Hang Zhou and
               Xinpeng Zhang and
               Weiming Zhang},
  title     = {Separable Reversible Data Hiding in Encrypted {JPEG} Bitstreams},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {6},
  pages     = {1055--1067},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2634161},
  doi       = {10.1109/TDSC.2016.2634161},
  timestamp = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/QianZZZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/QiuXZ18,
  author    = {Meikang Qiu and
               Yang Xiang and
               Yan Zhang},
  title     = {Guest Editor's Introduction to the Special Section on Social Network
               Security},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {4},
  pages     = {549--550},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2018.2841441},
  doi       = {10.1109/TDSC.2018.2841441},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/QiuXZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RothM18,
  author    = {Thomas Roth and
               Bruce McMillin},
  title     = {Physical Attestation in the Smart Grid for Distributed State Verification},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {2},
  pages     = {275--288},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2577021},
  doi       = {10.1109/TDSC.2016.2577021},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RothM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SaracinoSDM18,
  author    = {Andrea Saracino and
               Daniele Sgandurra and
               Gianluca Dini and
               Fabio Martinelli},
  title     = {{MADAM:} Effective and Efficient Behavior-based Android Malware Detection
               and Prevention},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {1},
  pages     = {83--97},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2536605},
  doi       = {10.1109/TDSC.2016.2536605},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SaracinoSDM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SchwahnWCS18,
  author    = {Oliver Schwahn and
               Stefan Winter and
               Nicolas Coppik and
               Neeraj Suri},
  title     = {How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux
               Code},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {6},
  pages     = {945--958},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2017.2745574},
  doi       = {10.1109/TDSC.2017.2745574},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SchwahnWCS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SendiLHC18,
  author    = {Alireza Shameli Sendi and
               Habib Louafi and
               Wenbo He and
               Mohamed Cheriet},
  title     = {Dynamic Optimal Countermeasure Selection for Intrusion Response System},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {5},
  pages     = {755--770},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2615622},
  doi       = {10.1109/TDSC.2016.2615622},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SendiLHC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShintreGB18,
  author    = {Saurabh Shintre and
               Virgil D. Gligor and
               Jo{\~{a}}o Barros},
  title     = {Anonymity Leakage in Private VoIP Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {1},
  pages     = {14--26},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2015.2513761},
  doi       = {10.1109/TDSC.2015.2513761},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ShintreGB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SomaniGSCR18,
  author    = {Gaurav Somani and
               Manoj Singh Gaur and
               Dheeraj Sanghi and
               Mauro Conti and
               Muttukrishnan Rajarajan},
  title     = {Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {6},
  pages     = {959--973},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2017.2763160},
  doi       = {10.1109/TDSC.2017.2763160},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SomaniGSCR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/StanekK18,
  author    = {Jan Stanek and
               Lukas Kencl},
  title     = {Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {4},
  pages     = {694--707},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2603501},
  doi       = {10.1109/TDSC.2016.2603501},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/StanekK18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SunCYC18,
  author    = {Hung{-}Min Sun and
               Shiuan{-}Tung Chen and
               Jyh{-}Haw Yeh and
               Chia{-}Yun Cheng},
  title     = {A Shoulder Surfing Resistant Graphical Authentication System},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {2},
  pages     = {180--193},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2539942},
  doi       = {10.1109/TDSC.2016.2539942},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SunCYC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SunFGLXZ18,
  author    = {Daniel Sun and
               Alan D. Fekete and
               Vincent Gramoli and
               Guoqiang Li and
               Xiwei Xu and
               Liming Zhu},
  title     = {R\({}^{\mbox{2}}\)C: Robust Rolling-Upgrade in Clouds},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {5},
  pages     = {811--823},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2615919},
  doi       = {10.1109/TDSC.2016.2615919},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SunFGLXZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TangW18,
  author    = {Qiang Tang and
               Jun Wang},
  title     = {Privacy-Preserving Friendship-Based Recommender Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {5},
  pages     = {784--796},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2631533},
  doi       = {10.1109/TDSC.2016.2631533},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/TangW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TsigkanosPGN18,
  author    = {Christos Tsigkanos and
               Liliana Pasquale and
               Carlo Ghezzi and
               Bashar Nuseibeh},
  title     = {On the Interplay Between Cyber and Physical Spaces for Adaptive Security},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {3},
  pages     = {466--480},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2599880},
  doi       = {10.1109/TDSC.2016.2599880},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/TsigkanosPGN18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Vaidya18,
  author    = {Jaideep Vaidya},
  title     = {Editorial},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {1},
  pages     = {1},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2017.2779333},
  doi       = {10.1109/TDSC.2017.2779333},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Vaidya18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WanD18,
  author    = {Zhiguo Wan and
               Robert H. Deng},
  title     = {VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword
               Search over Encrypted Cloud Data},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {6},
  pages     = {1083--1095},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2635128},
  doi       = {10.1109/TDSC.2016.2635128},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WanD18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangF18,
  author    = {Boyang Wang and
               Xinxin Fan},
  title     = {Search Ranges Efficiently and Compatibly as Keywords over Encrypted
               Data},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {6},
  pages     = {1027--1040},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2634013},
  doi       = {10.1109/TDSC.2016.2634013},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangF18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangHDCLZ18,
  author    = {Qian Wang and
               Meiqi He and
               Minxin Du and
               Sherman S. M. Chow and
               Russell W. F. Lai and
               Qin Zou},
  title     = {Searchable Encryption over Feature-Rich Data},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {3},
  pages     = {496--510},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2593444},
  doi       = {10.1109/TDSC.2016.2593444},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangHDCLZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangLHPF18,
  author    = {Tao Wang and
               Yao Liu and
               Tao Hou and
               Qingqi Pei and
               Song Fang},
  title     = {Signal Entanglement Based Pinpoint Waveforming for Location-Restricted
               Service Access Control},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {5},
  pages     = {853--867},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2614820},
  doi       = {10.1109/TDSC.2016.2614820},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangLHPF18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangW18,
  author    = {Ding Wang and
               Ping Wang},
  title     = {Two Birds with One Stone: Two-Factor Authentication with Security
               Beyond Conventional Bound},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {4},
  pages     = {708--722},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2605087},
  doi       = {10.1109/TDSC.2016.2605087},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangZLWQR18,
  author    = {Qian Wang and
               Yan Zhang and
               Xiao Lu and
               Zhibo Wang and
               Zhan Qin and
               Kui Ren},
  title     = {Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing
               with Differential Privacy},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {4},
  pages     = {591--606},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2599873},
  doi       = {10.1109/TDSC.2016.2599873},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangZLWQR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WeiCH18,
  author    = {Chia{-}Chen Wei and
               Chun{-}An Chen and
               Sun{-}Yuan Hsieh},
  title     = {Conditional (t, k)-Diagnosis in Regular and Irregular Graphs Under
               the Comparison Diagnosis Model},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {2},
  pages     = {351--356},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2585489},
  doi       = {10.1109/TDSC.2016.2585489},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WeiCH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Yavuz18,
  author    = {Attila Altay Yavuz},
  title     = {Immutable Authentication and Integrity Schemes for Outsourced Databases},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {1},
  pages     = {69--82},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2530708},
  doi       = {10.1109/TDSC.2016.2530708},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Yavuz18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YuanWWSR18,
  author    = {Xingliang Yuan and
               Xinyu Wang and
               Cong Wang and
               Anna Cinzia Squicciarini and
               Kui Ren},
  title     = {Towards Privacy-Preserving and Practical Image-Centric Social Discovery},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {5},
  pages     = {868--882},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2609930},
  doi       = {10.1109/TDSC.2016.2609930},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/YuanWWSR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangLNYS18,
  author    = {Kuan Zhang and
               Xiaohui Liang and
               Jianbing Ni and
               Kan Yang and
               Xuemin Sherman Shen},
  title     = {Exploiting Social Network to Enhance Human-to-Human Infection Analysis
               without Privacy Leakage},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {4},
  pages     = {607--620},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2626288},
  doi       = {10.1109/TDSC.2016.2626288},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhangLNYS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangLSW18,
  author    = {Fengwei Zhang and
               Kevin Leach and
               Angelos Stavrou and
               Haining Wang},
  title     = {Towards Transparent Debugging},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {2},
  pages     = {321--335},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2545671},
  doi       = {10.1109/TDSC.2016.2545671},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhangLSW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangZZY18,
  author    = {Jinxue Zhang and
               Rui Zhang and
               Yanchao Zhang and
               Guanhua Yan},
  title     = {The Rise of Social Botnets: Attacks and Countermeasures},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {6},
  pages     = {1068--1082},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2641441},
  doi       = {10.1109/TDSC.2016.2641441},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhangZZY18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhaoLLY18,
  author    = {Dongdong Zhao and
               Wenjian Luo and
               Ran Liu and
               Lihua Yue},
  title     = {Negative Iris Recognition},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {1},
  pages     = {112--125},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2015.2507133},
  doi       = {10.1109/TDSC.2015.2507133},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhaoLLY18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhaoLXA18,
  author    = {Xinxin Zhao and
               Lingjun Li and
               Guoliang Xue and
               Gail{-}Joon Ahn},
  title     = {Efficient Anonymous Message Submission},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {2},
  pages     = {217--230},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2556659},
  doi       = {10.1109/TDSC.2016.2556659},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhaoLXA18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhouCGFZ18,
  author    = {Peng Zhou and
               Rocky K. C. Chang and
               Xiaojing Gu and
               Minrui Fei and
               Jianying Zhou},
  title     = {Magic Train: Design of Measurement Methods against Bandwidth Inflation
               Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {1},
  pages     = {98--111},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2015.2509984},
  doi       = {10.1109/TDSC.2015.2509984},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhouCGFZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhouQYMWVG18,
  author    = {Fanfu Zhou and
               Zhengwei Qi and
               Jianguo Yao and
               Ruhui Ma and
               Bin Wang and
               Athanasios V. Vasilakos and
               Haibing Guan},
  title     = {D\({}^{\mbox{2}}\)FL: Design and Implementation of Distributed Dynamic
               Fault Localization},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {3},
  pages     = {378--392},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2599881},
  doi       = {10.1109/TDSC.2016.2599881},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhouQYMWVG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0001HHKSZ17,
  author    = {Zhe Liu and
               Xinyi Huang and
               Zhi Hu and
               Muhammad Khurram Khan and
               Hwajeong Seo and
               Lu Zhou},
  title     = {On Emerging Family of Elliptic Curves to Secure Internet of Things:
               {ECC} Comes of Age},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {3},
  pages     = {237--248},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2016.2577022},
  doi       = {10.1109/TDSC.2016.2577022},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/0001HHKSZ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AbdouMO17,
  author    = {AbdelRahman Abdou and
               Ashraf Matrawy and
               Paul C. van Oorschot},
  title     = {{CPV:} Delay-Based Location Verification for the Internet},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {2},
  pages     = {130--144},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2451614},
  doi       = {10.1109/TDSC.2015.2451614},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AbdouMO17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AndersonMRVM17,
  author    = {James W. Anderson and
               Hein Meling and
               Alexander Rasmussen and
               Amin Vahdat and
               Keith Marzullo},
  title     = {Local Recovery for High Availability in Strongly Consistent Cloud
               Services},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {2},
  pages     = {172--184},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2443781},
  doi       = {10.1109/TDSC.2015.2443781},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AndersonMRVM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AzarderakhshFGH17,
  author    = {Reza Azarderakhsh and
               Dieter Fishbein and
               Gurleen Grewal and
               Shi Hu and
               David Jao and
               Patrick Longa and
               Rajeev Verma},
  title     = {Fast Software Implementations of Bilinear Pairings},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {6},
  pages     = {605--619},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2507120},
  doi       = {10.1109/TDSC.2015.2507120},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AzarderakhshFGH17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BarazzuttiFMOR17,
  author    = {Rapha{\"{e}}l Barazzutti and
               Pascal Felber and
               Hugues Mercier and
               Emanuel Onica and
               Etienne Riviere},
  title     = {Efficient and Confidentiality-Preserving Content-Based Publish/Subscribe
               with Prefiltering},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {3},
  pages     = {308--325},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2449831},
  doi       = {10.1109/TDSC.2015.2449831},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/BarazzuttiFMOR17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Bertino17,
  author    = {Elisa Bertino},
  title     = {The State of the Journal Editorial},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {1},
  pages     = {1},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2016.2634638},
  doi       = {10.1109/TDSC.2016.2634638},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Bertino17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Bertino17a,
  author    = {Elisa Bertino},
  title     = {Editor's Note},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {6},
  pages     = {577},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2017.2767518},
  doi       = {10.1109/TDSC.2017.2767518},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Bertino17a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BhuiyanWWCLW17,
  author    = {Md. Zakirul Alam Bhuiyan and
               Guojun Wang and
               Jie Wu and
               Jiannong Cao and
               Xuefeng Liu and
               Tian Wang},
  title     = {Dependable Structural Health Monitoring Using Wireless Sensor Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {4},
  pages     = {363--376},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2469655},
  doi       = {10.1109/TDSC.2015.2469655},
  timestamp = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BhuiyanWWCLW17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BissiasLLP17,
  author    = {George Bissias and
               Brian Neil Levine and
               Marc Liberatore and
               Swagatika Prusty},
  title     = {Forensic Identification of Anonymous Sources in OneSwarm},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {6},
  pages     = {620--632},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2497706},
  doi       = {10.1109/TDSC.2015.2497706},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BissiasLLP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BonolaBPPM17,
  author    = {Marco Bonola and
               Giuseppe Bianchi and
               Giulio Picierro and
               Salvatore Pontarelli and
               Marco Monaci},
  title     = {StreaMon: {A} Data-Plane Programming Abstraction for Software-Defined
               Stream Monitoring},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {6},
  pages     = {664--678},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2499747},
  doi       = {10.1109/TDSC.2015.2499747},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/BonolaBPPM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BorchertSS17,
  author    = {Christoph Borchert and
               Horst Schirmeier and
               Olaf Spinczyk},
  title     = {Generic Soft-Error Detection and Correction for Concurrent Data Structures},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {1},
  pages     = {22--36},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2427832},
  doi       = {10.1109/TDSC.2015.2427832},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BorchertSS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CamaraLLVV17,
  author    = {Javier C{\'{a}}mara and
               Rog{\'{e}}rio de Lemos and
               Nuno Laranjeiro and
               Rafael Ventura and
               Marco Vieira},
  title     = {Robustness-Driven Resilience Evaluation of Self-Adaptive Software
               Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {1},
  pages     = {50--64},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2429128},
  doi       = {10.1109/TDSC.2015.2429128},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CamaraLLVV17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChooKAG17,
  author    = {Kim{-}Kwang Raymond Choo and
               Mehran Mozaffari Kermani and
               Reza Azarderakhsh and
               Manimaran Govindarasu},
  title     = {Emerging Embedded and Cyber Physical System Security Challenges and
               Innovations},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {3},
  pages     = {235--236},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2017.2664183},
  doi       = {10.1109/TDSC.2017.2664183},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChooKAG17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ColomboF17,
  author    = {Pietro Colombo and
               Elena Ferrari},
  title     = {Enhancing MongoDB with Purpose-Based Access Control},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {6},
  pages     = {591--604},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2497680},
  doi       = {10.1109/TDSC.2015.2497680},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ColomboF17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DimitriouK17,
  author    = {Tassos Dimitriou and
               Ghassan O. Karame},
  title     = {Enabling Anonymous Authorization and Rewarding in the Smart Grid},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {5},
  pages     = {565--572},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2496211},
  doi       = {10.1109/TDSC.2015.2496211},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/DimitriouK17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/EgeleSKV17,
  author    = {Manuel Egele and
               Gianluca Stringhini and
               Christopher Kruegel and
               Giovanni Vigna},
  title     = {Towards Detecting Compromised Accounts on Social Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {4},
  pages     = {447--460},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2479616},
  doi       = {10.1109/TDSC.2015.2479616},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/EgeleSKV17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/El-AtawyDA17,
  author    = {Adel El{-}Atawy and
               Qi Duan and
               Ehab Al{-}Shaer},
  title     = {A Novel Class of Robust Covert Channels Using Out-of-Order Packets},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {2},
  pages     = {116--129},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2443779},
  doi       = {10.1109/TDSC.2015.2443779},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/El-AtawyDA17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ElmallahG17,
  author    = {Ehab S. Elmallah and
               Mohamed G. Gouda},
  title     = {Hardness of Firewall Analysis},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {3},
  pages     = {339--349},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2455532},
  doi       = {10.1109/TDSC.2015.2455532},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ElmallahG17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GoryczkaX17,
  author    = {Slawomir Goryczka and
               Li Xiong},
  title     = {A Comprehensive Comparison of Multiparty Secure Additions with Differential
               Privacy},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {5},
  pages     = {463--477},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2484326},
  doi       = {10.1109/TDSC.2015.2484326},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/GoryczkaX17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuinBFT17,
  author    = {Ujjwal Guin and
               Swarup Bhunia and
               Domenic Forte and
               Mark Mohammad Tehranipoor},
  title     = {{SMA:} {A} System-Level Mutual Authentication for Protecting Electronic
               Hardware and Firmware},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {3},
  pages     = {265--278},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2016.2615609},
  doi       = {10.1109/TDSC.2016.2615609},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/GuinBFT17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuoMSHWV17,
  author    = {Fuchun Guo and
               Yi Mu and
               Willy Susilo and
               Homer Hsing and
               Duncan S. Wong and
               Vijay Varadharajan},
  title     = {Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight
               Devices},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {2},
  pages     = {211--220},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2445760},
  doi       = {10.1109/TDSC.2015.2445760},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/GuoMSHWV17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HanCAL17,
  author    = {Yi Han and
               Jeffrey Chan and
               Tansu Alpcan and
               Christopher Leckie},
  title     = {Using Virtual Machine Allocation Policies to Defend against Co-Resident
               Attacks in Cloud Computing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {1},
  pages     = {95--108},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2429132},
  doi       = {10.1109/TDSC.2015.2429132},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HanCAL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HerderRDYD17,
  author    = {Charles Herder and
               Ling Ren and
               Marten van Dijk and
               Meng{-}Day (Mandel) Yu and
               Srinivas Devadas},
  title     = {Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure
               Physical Unclonable Functions},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {1},
  pages     = {65--82},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2016.2536609},
  doi       = {10.1109/TDSC.2016.2536609},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HerderRDYD17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HomescuJCBLF17,
  author    = {Andrei Homescu and
               Todd Jackson and
               Stephen Crane and
               Stefan Brunthaler and
               Per Larsen and
               Michael Franz},
  title     = {Large-Scale Automated Software Diversity - Program Evolution Redux},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {2},
  pages     = {158--171},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2433252},
  doi       = {10.1109/TDSC.2015.2433252},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HomescuJCBLF17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/IllianoML17,
  author    = {Vittorio P. Illiano and
               Luis Mu{\~{n}}oz{-}Gonz{\'{a}}lez and
               Emil C. Lupu},
  title     = {Don't fool Me!: Detection, Characterisation and Diagnosis of Spoofed
               and Masked Events in Wireless Sensor Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {3},
  pages     = {279--293},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2016.2614505},
  doi       = {10.1109/TDSC.2016.2614505},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/IllianoML17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JiYHHLB17,
  author    = {Shouling Ji and
               Shukun Yang and
               Xin Hu and
               Weili Han and
               Zhigong Li and
               Raheem A. Beyah},
  title     = {Zero-Sum Password Cracking Game: {A} Large-Scale Empirical Study on
               the Crackability, Correlation, and Security of Passwords},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {5},
  pages     = {550--564},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2481884},
  doi       = {10.1109/TDSC.2015.2481884},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/JiYHHLB17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Joye17,
  author    = {Marc Joye},
  title     = {Cryptanalysis of a Privacy-Preserving Aggregation Protocol},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {6},
  pages     = {693--694},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2016.2519889},
  doi       = {10.1109/TDSC.2016.2519889},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Joye17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KruppSZ17,
  author    = {Brian Krupp and
               Nigamanth Sridhar and
               Wenbing Zhao},
  title     = {{SPE:} Security and Privacy Enhancement Framework for Mobile Devices},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {4},
  pages     = {433--446},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2465965},
  doi       = {10.1109/TDSC.2015.2465965},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KruppSZ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Kupcu17,
  author    = {Alptekin K{\"{u}}p{\c{c}}{\"{u}}},
  title     = {Incentivized Outsourced Computation Resistant to Malicious Contractors},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {6},
  pages     = {633--649},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2499738},
  doi       = {10.1109/TDSC.2015.2499738},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Kupcu17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiSLSJ17,
  author    = {Jingwei Li and
               Anna Cinzia Squicciarini and
               Dan Lin and
               Smitha Sundareswaran and
               Chunfu Jia},
  title     = {MMB\({}^{\mbox{cloud}}\)-Tree: Authenticated Index for Verifiable
               Cloud Service Selection},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {2},
  pages     = {185--198},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2445752},
  doi       = {10.1109/TDSC.2015.2445752},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiSLSJ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiSZX17,
  author    = {Qi Li and
               Ravi S. Sandhu and
               Xinwen Zhang and
               Mingwei Xu},
  title     = {Mandatory Content Access Control for Privacy Protection in Information
               Centric Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {5},
  pages     = {494--506},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2494049},
  doi       = {10.1109/TDSC.2015.2494049},
  timestamp = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiSZX17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuCCYP17,
  author    = {Hongbo Liu and
               Yingying Chen and
               Mooi Choo Chuah and
               Jie Yang and
               H. Vincent Poor},
  title     = {Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller
               Switching},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {4},
  pages     = {377--391},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2479624},
  doi       = {10.1109/TDSC.2015.2479624},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiuCCYP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaZWLL17,
  author    = {Hui Ma and
               Rui Zhang and
               Zhiguo Wan and
               Yao Lu and
               Suqing Lin},
  title     = {Verifiable and Exculpable Outsourced Attribute-Based Encryption for
               Access Control in Cloud Computing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {6},
  pages     = {679--692},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2499755},
  doi       = {10.1109/TDSC.2015.2499755},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MaZWLL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MoonLHKPK17,
  author    = {Hyungon Moon and
               Hojoon Lee and
               Ingoo Heo and
               Kihwan Kim and
               Yunheung Paek and
               Brent ByungHoon Kang},
  title     = {Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {2},
  pages     = {145--157},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2443803},
  doi       = {10.1109/TDSC.2015.2443803},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MoonLHKPK17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NadjiPA17,
  author    = {Yacin Nadji and
               Roberto Perdisci and
               Manos Antonakakis},
  title     = {Still Beheading Hydras: Botnet Takedowns Then and Now},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {5},
  pages     = {535--549},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2496176},
  doi       = {10.1109/TDSC.2015.2496176},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/NadjiPA17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PakC17,
  author    = {Wooguil Pak and
               Young{-}June Choi},
  title     = {High Performance and High Scalable Packet Classification Algorithm
               for Network Security Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {1},
  pages     = {37--49},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2443773},
  doi       = {10.1109/TDSC.2015.2443773},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PakC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PilaramE17,
  author    = {Hossein Pilaram and
               Taraneh Eghlidos},
  title     = {An Efficient Lattice Based Multi-Stage Secret Sharing Scheme},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {1},
  pages     = {2--8},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2432800},
  doi       = {10.1109/TDSC.2015.2432800},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PilaramE17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RabiehMAT17,
  author    = {Khaled Rabieh and
               Mohamed M. E. A. Mahmoud and
               Kemal Akkaya and
               Samet Tonyali},
  title     = {Scalable Certificate Revocation Schemes for Smart Grid {AMI} Networks
               Using Bloom Filters},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {4},
  pages     = {420--432},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2467385},
  doi       = {10.1109/TDSC.2015.2467385},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RabiehMAT17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RahmanMAS17,
  author    = {Mohammad Ashiqur Rahman and
               Mohammad Hossein Manshaei and
               Ehab Al{-}Shaer and
               Mohamed Shehab},
  title     = {Secure and Private Data Aggregation for Energy Consumption Scheduling
               in Smart Grids},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {2},
  pages     = {221--234},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2446492},
  doi       = {10.1109/TDSC.2015.2446492},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RahmanMAS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RahulamathavanR17,
  author    = {Yogachandran Rahulamathavan and
               Muttukrishnan Rajarajan},
  title     = {Efficient Privacy-Preserving Facial Expression Classification},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {3},
  pages     = {326--338},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2453963},
  doi       = {10.1109/TDSC.2015.2453963},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RahulamathavanR17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RezaeiHS17,
  author    = {Fahimeh Rezaei and
               Michael Hempel and
               Hamid Sharif},
  title     = {Towards a Reliable Detection of Covert Timing Channels over Real-Time
               Network Traffic},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {3},
  pages     = {249--264},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2017.2656078},
  doi       = {10.1109/TDSC.2017.2656078},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RezaeiHS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShafiqGMPAKG17,
  author    = {Basit Shafiq and
               Sameera Ghayyur and
               Ammar Masood and
               Zahid Pervaiz and
               Abdulrahman Almutairi and
               M. Farrukh Khan and
               Arif Ghafoor},
  title     = {Composability Verification of Multi-Service Workflows in a Policy-Driven
               Cloud Computing Environment},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {5},
  pages     = {478--493},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2481881},
  doi       = {10.1109/TDSC.2015.2481881},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ShafiqGMPAKG17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShinK17,
  author    = {SeongHan Shin and
               Kazukuni Kobara},
  title     = {Security Analysis of Password-Authenticated Key Retrieval},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {5},
  pages     = {573--576},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2490064},
  doi       = {10.1109/TDSC.2015.2490064},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ShinK17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SuSLDH17,
  author    = {Chunhua Su and
               Bagus Santoso and
               Yingjiu Li and
               Robert H. Deng and
               Xinyi Huang},
  title     = {Universally Composable {RFID} Mutual Authentication},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {1},
  pages     = {83--94},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2434376},
  doi       = {10.1109/TDSC.2015.2434376},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SuSLDH17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TianDBD17,
  author    = {Guanyu Tian and
               Zhenhai Duan and
               Todd Baumeister and
               Yingfei Dong},
  title     = {A Traceback Attack on Freenet},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {3},
  pages     = {294--307},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2453983},
  doi       = {10.1109/TDSC.2015.2453983},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/TianDBD17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TilocaGDAD17,
  author    = {Marco Tiloca and
               Domenico De Guglielmo and
               Gianluca Dini and
               Giuseppe Anastasi and
               Sajal K. Das},
  title     = {{JAMMY:} {A} Distributed and Dynamic Solution to Selective Jamming
               Attack in {TDMA} WSNs},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {4},
  pages     = {392--405},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2467391},
  doi       = {10.1109/TDSC.2015.2467391},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/TilocaGDAD17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangYLJZD17,
  author    = {Daibin Wang and
               Haixia Yao and
               Yingjiu Li and
               Hai Jin and
               Deqing Zou and
               Robert H. Deng},
  title     = {A Secure, Usable, and Transparent Middleware for Permission Managers
               on Android},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {4},
  pages     = {350--362},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2479613},
  doi       = {10.1109/TDSC.2015.2479613},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangYLJZD17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XiongS17,
  author    = {Hu Xiong and
               Jianfei Sun},
  title     = {Comments on "Verifiable and Exculpable Outsourced Attribute-Based
               Encryption for Access Control in Cloud Computing"},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {4},
  pages     = {461--462},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2017.2710119},
  doi       = {10.1109/TDSC.2017.2710119},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/XiongS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuGGFL17,
  author    = {Kaihe Xu and
               Yuanxiong Guo and
               Linke Guo and
               Yuguang Fang and
               Xiaolin Li},
  title     = {My Privacy My Decision: Control of Photo Sharing on Online Social
               Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {2},
  pages     = {199--210},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2443795},
  doi       = {10.1109/TDSC.2015.2443795},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/XuGGFL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YangCC17,
  author    = {Zequ Yang and
               Peng Cheng and
               Jiming Chen},
  title     = {Learning-Based Jamming Attack against Low-Duty-Cycle Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {6},
  pages     = {650--663},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2501288},
  doi       = {10.1109/TDSC.2015.2501288},
  timestamp = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/YangCC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangCZ17,
  author    = {Yuan Zhang and
               Qingjun Chen and
               Sheng Zhong},
  title     = {Efficient and Privacy-Preserving Min and \emph{k}th Min Computations
               in Mobile Sensing Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {1},
  pages     = {9--21},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2432814},
  doi       = {10.1109/TDSC.2015.2432814},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhangCZ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangLL17,
  author    = {Peng Zhang and
               Qi Li and
               Patrick P. C. Lee},
  title     = {Achieving Content-Oriented Anonymity with {CRISP}},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {6},
  pages     = {578--590},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2498603},
  doi       = {10.1109/TDSC.2015.2498603},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhangLL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangLLLCWC17,
  author    = {Ji Zhang and
               Hongzhou Li and
               Xuemei Liu and
               Yonglong Luo and
               Fulong Chen and
               Hua Wang and
               Liang Chang},
  title     = {On Efficient and Robust Anonymization for Privacy Protection on Massive
               Streaming Categorical Information},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {5},
  pages     = {507--520},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2483503},
  doi       = {10.1109/TDSC.2015.2483503},
  timestamp = {Wed, 14 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhangLLLCWC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhengLLH17,
  author    = {Yao Zheng and
               Ming Li and
               Wenjing Lou and
               Y. Thomas Hou},
  title     = {Location Based Handshake and Private Proximity Test with Location
               Tags},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {4},
  pages     = {406--419},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2472529},
  doi       = {10.1109/TDSC.2015.2472529},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhengLLH17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZilbermanPE17,
  author    = {Polina Zilberman and
               Rami Puzis and
               Yuval Elovici},
  title     = {On Network Footprint of Traffic Inspection and Filtering at Global
               Scrubbing Centers},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {14},
  number    = {5},
  pages     = {521--534},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2494039},
  doi       = {10.1109/TDSC.2015.2494039},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZilbermanPE17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0001GK16,
  author    = {Michael Backes and
               Niklas Grimm and
               Aniket Kate},
  title     = {Data Lineage in Malicious Environments},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {2},
  pages     = {178--191},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2399296},
  doi       = {10.1109/TDSC.2015.2399296},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/0001GK16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AlmohriWYO16,
  author    = {Hussain M. J. Almohri and
               Layne T. Watson and
               Danfeng Yao and
               Xinming Ou},
  title     = {Security Optimization of Dynamic Networks with Probabilistic Graph
               Modeling and Linear Programming},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {4},
  pages     = {474--487},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2411264},
  doi       = {10.1109/TDSC.2015.2411264},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AlmohriWYO16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ArtailA16,
  author    = {Hassan Artail and
               Noor Abbani},
  title     = {A Pseudonym Management System to Achieve Anonymity in Vehicular Ad
               Hoc Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {1},
  pages     = {106--119},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2480699},
  doi       = {10.1109/TDSC.2015.2480699},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ArtailA16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Bertino16,
  author    = {Elisa Bertino},
  title     = {The State of the Journal Editorial},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {1},
  pages     = {1},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2504839},
  doi       = {10.1109/TDSC.2015.2504839},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Bertino16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BertinoCLLSV16,
  author    = {Elisa Bertino and
               Dario Catalano and
               Qi Li and
               Alex X. Liu and
               Anna Cinzia Squicciarini and
               Alexey V. Vinel},
  title     = {Editor's Note},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {4},
  pages     = {409--410},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2016.2564478},
  doi       = {10.1109/TDSC.2016.2564478},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BertinoCLLSV16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CarminatiFG16,
  author    = {Barbara Carminati and
               Elena Ferrari and
               Michele Guglielmi},
  title     = {Detection of Unspecified Emergencies for Controlled Information Sharing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {6},
  pages     = {630--643},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2427846},
  doi       = {10.1109/TDSC.2015.2427846},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CarminatiFG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CastiglioneSM16,
  author    = {Arcangelo Castiglione and
               Alfredo De Santis and
               Barbara Masucci},
  title     = {Key Indistinguishability versus Strong Key Indistinguishability for
               Hierarchical Key Assignment Schemes},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {4},
  pages     = {451--460},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2413415},
  doi       = {10.1109/TDSC.2015.2413415},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CastiglioneSM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChangYD16,
  author    = {Che{-}Yu Chang and
               Hsu{-}Chun Yen and
               Der{-}Jiunn Deng},
  title     = {{V2V} QoS Guaranteed Channel Access in {IEEE} 802.11p VANETs},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {1},
  pages     = {5--17},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2399912},
  doi       = {10.1109/TDSC.2015.2399912},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChangYD16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChenBG16,
  author    = {Ing{-}Ray Chen and
               Fenye Bao and
               Jia Guo},
  title     = {Trust-Based Service Management for Social Internet of Things Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {6},
  pages     = {684--696},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2420552},
  doi       = {10.1109/TDSC.2015.2420552},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChenBG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChengPS16,
  author    = {Yuan Cheng and
               Jaehong Park and
               Ravi S. Sandhu},
  title     = {An Access Control Model for Online Social Networks Using User-to-User
               Relationships},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {4},
  pages     = {424--436},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2406705},
  doi       = {10.1109/TDSC.2015.2406705},
  timestamp = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChengPS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DazaPLS16,
  author    = {Vanesa Daza and
               Roberto Di Pietro and
               Flavio Lombardi and
               Matteo Signorini},
  title     = {FRoDO: Fraud Resilient Device for Off-Line Micro-Payments},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {2},
  pages     = {296--311},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2432813},
  doi       = {10.1109/TDSC.2015.2432813},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/DazaPLS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/EizaON16,
  author    = {Mahmoud Hashem Eiza and
               Thomas J. Owens and
               Qiang Ni},
  title     = {Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for
               VANETs},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {1},
  pages     = {32--45},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2014.2382602},
  doi       = {10.1109/TDSC.2014.2382602},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/EizaON16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Erguler16,
  author    = {Imran Erguler},
  title     = {Achieving Flatness: Selecting the Honeywords from Existing User Passwords},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {2},
  pages     = {284--295},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2406707},
  doi       = {10.1109/TDSC.2015.2406707},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Erguler16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FangLN16,
  author    = {Song Fang and
               Yao Liu and
               Peng Ning},
  title     = {Wireless Communications under Broadband Reactive Jamming Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {3},
  pages     = {394--408},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2399304},
  doi       = {10.1109/TDSC.2015.2399304},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/FangLN16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FattaholmananR16,
  author    = {Ali Fattaholmanan and
               Hamid R. Rabiee},
  title     = {A Large-Scale Active Measurement Study on the Effectiveness of Piece-Attack
               on BitTorrent Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {5},
  pages     = {509--518},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2420561},
  doi       = {10.1109/TDSC.2015.2420561},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/FattaholmananR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FernandezSBS16,
  author    = {Pedro J. Fern{\'{a}}ndez and
               Jos{\'{e}} Santa and
               Fernando Bernal{-}Hidalgo and
               Antonio F. Skarmeta},
  title     = {Securing Vehicular IPv6 Communications},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {1},
  pages     = {46--58},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2399300},
  doi       = {10.1109/TDSC.2015.2399300},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/FernandezSBS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HaoCZ16,
  author    = {Feng Hao and
               Dylan Clarke and
               Avelino Francisco Zorzo},
  title     = {Deleting Secret Data with Public Verifiability},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {6},
  pages     = {617--629},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2423684},
  doi       = {10.1109/TDSC.2015.2423684},
  timestamp = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HaoCZ16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HongK16,
  author    = {Jin B. Hong and
               Dong Seong Kim},
  title     = {Assessing the Effectiveness of Moving Target Defenses Using Security
               Models},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {2},
  pages     = {163--177},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2443790},
  doi       = {10.1109/TDSC.2015.2443790},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/HongK16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HuangWLZZW16,
  author    = {Xin{-}Lin Huang and
               Jun Wu and
               Wenfeng Li and
               Zhifeng Zhang and
               Fusheng Zhu and
               Minghao Wu},
  title     = {Historical Spectrum Sensing Data Mining for Cognitive Radio Enabled
               Vehicular Ad-Hoc Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {1},
  pages     = {59--70},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2453967},
  doi       = {10.1109/TDSC.2015.2453967},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HuangWLZZW16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Jiang16,
  author    = {Shaoquan Jiang},
  title     = {Group Key Agreement with Local Connectivity},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {3},
  pages     = {326--339},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2399299},
  doi       = {10.1109/TDSC.2015.2399299},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Jiang16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KaynarS16,
  author    = {Kerem Kaynar and
               Fikret Sivrikaya},
  title     = {Distributed Attack Graph Generation},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {5},
  pages     = {519--532},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2423682},
  doi       = {10.1109/TDSC.2015.2423682},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KaynarS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KloiberHSSG16,
  author    = {Bernhard Kloiber and
               J{\'{e}}r{\^{o}}me H{\"{a}}rri and
               Thomas Strang and
               Stephan Sand and
               Cristina Rico Garcia},
  title     = {Random Transmit Power Control for {DSRC} and its Application to Cooperative
               Safety},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {1},
  pages     = {18--31},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2449845},
  doi       = {10.1109/TDSC.2015.2449845},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KloiberHSSG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KumarMCLR16,
  author    = {Neeraj Kumar and
               Sudip Misra and
               Naveen K. Chilamkurti and
               Jong{-}Hyouk Lee and
               Joel J. P. C. Rodrigues},
  title     = {Bayesian Coalition Negotiation Game as a Utility for Secure Energy
               Management in a Vehicles-to-Grid Environment},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {1},
  pages     = {133--145},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2415489},
  doi       = {10.1109/TDSC.2015.2415489},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KumarMCLR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LevitinXZD16,
  author    = {Gregory Levitin and
               Liudong Xing and
               Qingqing Zhai and
               Yuanshun Dai},
  title     = {Optimization of Full versus Incremental Periodic Backup Policy},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {6},
  pages     = {644--656},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2413404},
  doi       = {10.1109/TDSC.2015.2413404},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LevitinXZD16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiYLLZS16,
  author    = {Hongwei Li and
               Yi Yang and
               Tom H. Luan and
               Xiaohui Liang and
               Liang Zhou and
               Xuemin Sherman Shen},
  title     = {Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries
               over Encrypted Cloud Data},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {3},
  pages     = {312--325},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2406704},
  doi       = {10.1109/TDSC.2015.2406704},
  timestamp = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiYLLZS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiZGCTZLL16,
  author    = {Wei Li and
               Wenwen Zhang and
               Dawu Gu and
               Yanqin Cao and
               Zhi Tao and
               Zhihong Zhou and
               Ya Liu and
               Zhiqiang Liu},
  title     = {Impossible Differential Fault Analysis on the {LED} Lightweight Cryptosystem
               in the Vehicular Ad-Hoc Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {1},
  pages     = {84--92},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2449849},
  doi       = {10.1109/TDSC.2015.2449849},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiZGCTZLL16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiZX16,
  author    = {Lingjun Li and
               Xinxin Zhao and
               Guoliang Xue},
  title     = {A Proximity Authentication System for Smartphones},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {6},
  pages     = {605--616},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2427848},
  doi       = {10.1109/TDSC.2015.2427848},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiZX16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuCG16,
  author    = {Yang Liu and
               Wenji Chen and
               Yong Guan},
  title     = {Identifying High-Cardinality Hosts from Network-Wide Traffic Measurements},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {5},
  pages     = {547--558},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2423675},
  doi       = {10.1109/TDSC.2015.2423675},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiuCG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuHH16,
  author    = {Yang Liu and
               Shiyan Hu and
               Tsung{-}Yi Ho},
  title     = {Leveraging Strategic Detection Techniques for Smart Home Pricing Cyberattacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {2},
  pages     = {220--235},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2427841},
  doi       = {10.1109/TDSC.2015.2427841},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiuHH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LyuGZM16,
  author    = {Chen Lyu and
               Dawu Gu and
               Yunze Zeng and
               Prasant Mohapatra},
  title     = {{PBA:} Prediction-Based Authentication for Vehicle-to-Vehicle Communications},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {1},
  pages     = {71--83},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2399297},
  doi       = {10.1109/TDSC.2015.2399297},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LyuGZM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaoLMCW16,
  author    = {Xianping Mao and
               Junzuo Lai and
               Qixiang Mei and
               Kefei Chen and
               Jian Weng},
  title     = {Generic and Efficient Constructions of Attribute-Based Encryption
               with Verifiable Outsourced Decryption},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {5},
  pages     = {533--546},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2423669},
  doi       = {10.1109/TDSC.2015.2423669},
  timestamp = {Tue, 12 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MaoLMCW16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Martinez-Alvarez16,
  author    = {Antonio Mart{\'{\i}}nez{-}{\'{A}}lvarez and
               Felipe Restrepo{-}Calle and
               Sergio Cuenca{-}Asensi and
               Leonardo M. Reyneri and
               Almudena Lindoso and
               Luis Entrena},
  title     = {A Hardware-Software Approach for On-Line Soft Error Mitigation in
               Interrupt-Driven Applications},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {4},
  pages     = {502--508},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2014.2382593},
  doi       = {10.1109/TDSC.2014.2382593},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Martinez-Alvarez16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MazurczykHS16,
  author    = {Wojciech Mazurczyk and
               Thomas Holt and
               Krzysztof Szczypiorski},
  title     = {Guest Editors' Introduction: Special Issue on Cyber Crime},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {2},
  pages     = {146--147},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2502407},
  doi       = {10.1109/TDSC.2015.2502407},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MazurczykHS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MoXZZ16,
  author    = {Yuchang Mo and
               Liudong Xing and
               Farong Zhong and
               Zhao Zhang},
  title     = {Reliability Evaluation of Network Systems with Dependent Propagated
               Failures Using Decision Diagrams},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {6},
  pages     = {672--683},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2433254},
  doi       = {10.1109/TDSC.2015.2433254},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MoXZZ16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PanLPY0RF16,
  author    = {Xian Pan and
               Zhen Ling and
               Aniket Pingley and
               Wei Yu and
               Nan Zhang and
               Kui Ren and
               Xinwen Fu},
  title     = {Password Extraction via Reconstructed Wireless Mouse Trajectory},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {4},
  pages     = {461--473},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2413410},
  doi       = {10.1109/TDSC.2015.2413410},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PanLPY0RF16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PonomarevA16,
  author    = {Stanislav Ponomarev and
               Travis Atkison},
  title     = {Industrial Control System Network Intrusion Detection by Telemetry
               Analysis},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {2},
  pages     = {252--260},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2443793},
  doi       = {10.1109/TDSC.2015.2443793},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PonomarevA16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RajkumarS16,
  author    = {P. V. Rajkumar and
               Ravi S. Sandhu},
  title     = {Safety Decidability for Pre-Authorization Usage Control with Finite
               Attribute Domains},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {5},
  pages     = {582--590},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2427834},
  doi       = {10.1109/TDSC.2015.2427834},
  timestamp = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/RajkumarS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RiekBM16,
  author    = {Markus Riek and
               Rainer B{\"{o}}hme and
               Tyler Moore},
  title     = {Measuring the Influence of Perceived Cybercrime Risk on Online Service
               Avoidance},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {2},
  pages     = {261--273},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2410795},
  doi       = {10.1109/TDSC.2015.2410795},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RiekBM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SamanthulaJ16,
  author    = {Bharath K. Samanthula and
               Wei Jiang},
  title     = {Secure Multiset Intersection Cardinality and its Application to Jaccard
               Coefficient},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {5},
  pages     = {591--604},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2415482},
  doi       = {10.1109/TDSC.2015.2415482},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SamanthulaJ16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShenKSN16,
  author    = {Hui Shen and
               Ram Krishnan and
               Rocky Slavin and
               Jianwei Niu},
  title     = {Sequence Diagram Aided Privacy Policy Specification},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {3},
  pages     = {381--393},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2014.2384500},
  doi       = {10.1109/TDSC.2014.2384500},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ShenKSN16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShresthaHRS16,
  author    = {Pradhumna Lal Shrestha and
               Michael Hempel and
               Fahimeh Rezaei and
               Hamid Sharif},
  title     = {A Support Vector Machine-Based Framework for Detection of Covert Timing
               Channels},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {2},
  pages     = {274--283},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2423680},
  doi       = {10.1109/TDSC.2015.2423680},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ShresthaHRS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SongLK16,
  author    = {Jonghyuk Song and
               Sangho Lee and
               Jong Kim},
  title     = {Inference Attack on Browsing History of Twitter Users Using Public
               Click Analytics and Twitter Metadata},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {3},
  pages     = {340--354},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2014.2382577},
  doi       = {10.1109/TDSC.2014.2382577},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SongLK16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SoodZE16,
  author    = {Aditya K. Sood and
               Sherali Zeadally and
               Richard J. Enbody},
  title     = {An Empirical Study of HTTP-based Financial Botnets},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {2},
  pages     = {236--251},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2014.2382590},
  doi       = {10.1109/TDSC.2014.2382590},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SoodZE16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SunP0S16,
  author    = {Lianshan Sun and
               Jaehong Park and
               Dang Nguyen and
               Ravi S. Sandhu},
  title     = {A Provenance-Aware Access Control Framework with Typed Provenance},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {4},
  pages     = {411--423},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2410793},
  doi       = {10.1109/TDSC.2015.2410793},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SunP0S16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SunSKLV16,
  author    = {Min{-}Te Sun and
               Kazuya Sakai and
               Wei{-}Shinn Ku and
               Ten{-}Hwang Lai and
               Athanasios V. Vasilakos},
  title     = {Private and Secure Tag Access for Large-Scale {RFID} Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {6},
  pages     = {657--671},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2427833},
  doi       = {10.1109/TDSC.2015.2427833},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SunSKLV16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TatiRKCSP16,
  author    = {Srikar Tati and
               Scott Rager and
               Bongjun Ko and
               Guohong Cao and
               Ananthram Swami and
               Thomas La Porta},
  title     = {netCSI: {A} Generic Fault Diagnosis Algorithm for Large-Scale Failures
               in Computer Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {3},
  pages     = {355--368},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2014.2369051},
  doi       = {10.1109/TDSC.2014.2369051},
  timestamp = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/TatiRKCSP16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TimpnerSW16,
  author    = {Julian Timpner and
               Dominik Sch{\"{u}}rmann and
               Lars C. Wolf},
  title     = {Trustworthy Parking Communities: Helping Your Neighbor to Find a Space},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {1},
  pages     = {120--132},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2427838},
  doi       = {10.1109/TDSC.2015.2427838},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/TimpnerSW16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VasekWM16,
  author    = {Marie Vasek and
               John Wadleigh and
               Tyler Moore},
  title     = {Hacking Is Not Random: {A} Case-Control Study of Webserver-Compromise
               Risk},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {2},
  pages     = {206--219},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2427847},
  doi       = {10.1109/TDSC.2015.2427847},
  timestamp = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/VasekWM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VinelMH16,
  author    = {Alexey V. Vinel and
               Xiaomin Ma and
               Dijiang Huang},
  title     = {Guest Editors' Introduction: Special Issue on Reliable and Secure
               VANETs},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {1},
  pages     = {2--4},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2505361},
  doi       = {10.1109/TDSC.2015.2505361},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/VinelMH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VolckaertCS16,
  author    = {Stijn Volckaert and
               Bart Coppens and
               Bjorn De Sutter},
  title     = {Cloning Your Gadgets: Complete {ROP} Attack Immunity with Multi-Variant
               Execution},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {4},
  pages     = {437--450},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2411254},
  doi       = {10.1109/TDSC.2015.2411254},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/VolckaertCS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangWS16,
  author    = {Chi{-}Wei Wang and
               Chia{-}Wei Wang and
               Shiuhpyng Shieh},
  title     = {ProbeBuilder: Uncovering Opaque Kernel Data Structures for Automatic
               Probe Construction},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {5},
  pages     = {568--581},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2416728},
  doi       = {10.1109/TDSC.2015.2416728},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangWS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WatsonSMMH16,
  author    = {Michael R. Watson and
               Noor{-}ul{-}Hassan Shirazi and
               Angelos K. Marnerides and
               Andreas Mauthe and
               David Hutchison},
  title     = {Malware Detection in Cloud Computing Infrastructures},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {2},
  pages     = {192--205},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2457918},
  doi       = {10.1109/TDSC.2015.2457918},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WatsonSMMH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WuZY16,
  author    = {Zhijun Wu and
               Liyuan Zhang and
               Meng Yue},
  title     = {Low-Rate DoS Attacks Detection Based on Network Multifractal},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {5},
  pages     = {559--567},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2443807},
  doi       = {10.1109/TDSC.2015.2443807},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WuZY16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YangXYWD16,
  author    = {Zhi Yang and
               Jilong Xue and
               Xiaoyong Yang and
               Xiao Wang and
               Yafei Dai},
  title     = {VoteTrust: Leveraging Friend Invitation Graph to Defend against Social
               Network Sybils},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {4},
  pages     = {488--501},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2410792},
  doi       = {10.1109/TDSC.2015.2410792},
  timestamp = {Wed, 23 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/YangXYWD16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YiBGSW16,
  author    = {Xun Yi and
               Athman Bouguettaya and
               Dimitrios Georgakopoulos and
               Andy Song and
               Jan Willemson},
  title     = {Privacy Protection for Wireless Medical Sensor Data},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {3},
  pages     = {369--380},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2406699},
  doi       = {10.1109/TDSC.2015.2406699},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/YiBGSW16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YuKHXZG16,
  author    = {Rong Yu and
               Jiawen Kang and
               Xumin Huang and
               Shengli Xie and
               Yan Zhang and
               Stein Gjessing},
  title     = {MixGroup: Accumulative Pseudonym Exchanging for Location Privacy Enhancement
               in Vehicular Social Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {1},
  pages     = {93--105},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2399291},
  doi       = {10.1109/TDSC.2015.2399291},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/YuKHXZG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZawoadDH16,
  author    = {Shams Zawoad and
               Amit Kumar Dutta and
               Ragib Hasan},
  title     = {Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {2},
  pages     = {148--162},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2482484},
  doi       = {10.1109/TDSC.2015.2482484},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZawoadDH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0001LHML15,
  author    = {Xiaofeng Chen and
               Jin Li and
               Xinyi Huang and
               Jianfeng Ma and
               Wenjing Lou},
  title     = {New Publicly Verifiable Databases with Efficient Updates},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {5},
  pages     = {546--556},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2366471},
  doi       = {10.1109/TDSC.2014.2366471},
  timestamp = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/0001LHML15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0002HKB15,
  author    = {Aditi Gupta and
               Javid Habibi and
               Michael S. Kirkpatrick and
               Elisa Bertino},
  title     = {Marlin: Mitigating Code Reuse Attacks Using Code Randomization},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {3},
  pages     = {326--337},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2345384},
  doi       = {10.1109/TDSC.2014.2345384},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/0002HKB15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0007SZZ15,
  author    = {Rui Zhang and
               Jingchao Sun and
               Yanchao Zhang and
               Chi Zhang},
  title     = {Secure Spatial Top-k Query Processing via Untrusted Location-Based
               Service Providers},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {1},
  pages     = {111--124},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2309133},
  doi       = {10.1109/TDSC.2014.2309133},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/0007SZZ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AhnL15,
  author    = {Dongkyun Ahn and
               Gyungho Lee},
  title     = {A Memory-Access Validation Scheme against Payload Injection Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {4},
  pages     = {387--399},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2355844},
  doi       = {10.1109/TDSC.2014.2355844},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AhnL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BendahmaneEMY15,
  author    = {Ahmed Bendahmane and
               Mohamed Essaaidi and
               Ahmed El Moussaoui and
               Ali Younes},
  title     = {The Effectiveness of Reputation-Based Voting for Collusion Tolerance
               in Large-Scale Grids},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {6},
  pages     = {665--674},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2369049},
  doi       = {10.1109/TDSC.2014.2369049},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BendahmaneEMY15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Bertino15,
  author    = {Elisa Bertino},
  title     = {The State of the Journal Editorial},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {2},
  pages     = {135},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2015.2394031},
  doi       = {10.1109/TDSC.2015.2394031},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Bertino15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BovenziBRB15,
  author    = {Antonio Bovenzi and
               Francesco Brancati and
               Stefano Russo and
               Andrea Bondavalli},
  title     = {An OS-level Framework for Anomaly Detection in Complex Software Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {3},
  pages     = {366--372},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2334305},
  doi       = {10.1109/TDSC.2014.2334305},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BovenziBRB15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CafaroCM15,
  author    = {Massimo Cafaro and
               Roberto Civino and
               Barbara Masucci},
  title     = {On the Equivalence of Two Security Notions for Hierarchical Key Assignment
               Schemes in the Unconditional Setting},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {4},
  pages     = {485--490},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2355841},
  doi       = {10.1109/TDSC.2014.2355841},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CafaroCM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CeccarelliMBLMB15,
  author    = {Andrea Ceccarelli and
               Leonardo Montecchi and
               Francesco Brancati and
               Paolo Lollini and
               Angelo Marguglio and
               Andrea Bondavalli},
  title     = {Continuous and Transparent User Identity Verification for Secure Internet
               Services},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {3},
  pages     = {270--283},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2013.2297709},
  doi       = {10.1109/TDSC.2013.2297709},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/CeccarelliMBLMB15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CenGSL15,
  author    = {Lei Cen and
               Christopher S. Gates and
               Luo Si and
               Ninghui Li},
  title     = {A Probabilistic Discriminative Model for Android Malware Detection
               with Decompiled Source Code},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {4},
  pages     = {400--412},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2355839},
  doi       = {10.1109/TDSC.2014.2355839},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CenGSL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChimYLHZ15,
  author    = {Tat Wing Chim and
               Siu{-}Ming Yiu and
               Victor O. K. Li and
               Lucas Chi Kwong Hui and
               Jin Zhong},
  title     = {{PRGA:} Privacy-Preserving Recording {\&} Gateway-Assisted Authentication
               of Power Usage Information for Smart Grid},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {1},
  pages     = {85--97},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2313861},
  doi       = {10.1109/TDSC.2014.2313861},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChimYLHZ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DelacSS15,
  author    = {Goran Delac and
               Marin Silic and
               Sinisa Srbljic},
  title     = {A Reliability Improvement Method for SOA-Based Applications},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {2},
  pages     = {136--149},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2327971},
  doi       = {10.1109/TDSC.2014.2327971},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/DelacSS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DiaF15,
  author    = {Ousmane Amadou Dia and
               Csilla Farkas},
  title     = {Risk Aware Query Replacement Approach for Secure Databases Performance
               Management},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {2},
  pages     = {217--229},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2306675},
  doi       = {10.1109/TDSC.2014.2306675},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/DiaF15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DuanPL15,
  author    = {Sisi Duan and
               Sean Peisert and
               Karl N. Levitt},
  title     = {hBFT: Speculative Byzantine Fault Tolerance with Minimum Cost},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {1},
  pages     = {58--70},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2312331},
  doi       = {10.1109/TDSC.2014.2312331},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/DuanPL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Entezari-Maleki15,
  author    = {Reza Entezari{-}Maleki and
               Kishor S. Trivedi and
               Ali Movaghar},
  title     = {Performability Evaluation of Grid Environments Using Stochastic Reward
               Nets},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {2},
  pages     = {204--216},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2320741},
  doi       = {10.1109/TDSC.2014.2320741},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Entezari-Maleki15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuoZF15,
  author    = {Linke Guo and
               Chi Zhang and
               Yuguang Fang},
  title     = {A Trust-Based Privacy-Preserving Friend Recommendation Scheme for
               Online Social Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {4},
  pages     = {413--427},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2355824},
  doi       = {10.1109/TDSC.2014.2355824},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/GuoZF15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HarikaNJSVA15,
  author    = {Pullamsetty Harika and
               Marreddy Nagajyothi and
               John C. John and
               Shamik Sural and
               Jaideep Vaidya and
               Vijayalakshmi Atluri},
  title     = {Meeting Cardinality Constraints in Role Mining},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {1},
  pages     = {71--84},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2309117},
  doi       = {10.1109/TDSC.2014.2309117},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HarikaNJSVA15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HeneckaR15,
  author    = {Wilko Henecka and
               Matthew Roughan},
  title     = {Privacy-Preserving Fraud Detection Across Multiple Phone Record Databases},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {6},
  pages     = {640--651},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2382573},
  doi       = {10.1109/TDSC.2014.2382573},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HeneckaR15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HolmSBE15,
  author    = {Hannes Holm and
               Khurram Shahzad and
               Markus Buschle and
               Mathias Ekstedt},
  title     = {P\({}^{\mbox{2}}\)CySeMoL: Predictive, Probabilistic Cyber Security
               Modeling Language},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {6},
  pages     = {626--639},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2382574},
  doi       = {10.1109/TDSC.2014.2382574},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HolmSBE15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HongVLKG15,
  author    = {Yuan Hong and
               Jaideep Vaidya and
               Haibing Lu and
               Panagiotis Karras and
               Sanjay Goel},
  title     = {Collaborative Search Log Sanitization: Toward Differential Privacy
               and Boosted Utility},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {5},
  pages     = {504--518},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2369034},
  doi       = {10.1109/TDSC.2014.2369034},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HongVLKG15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JingAZH15,
  author    = {Yiming Jing and
               Gail{-}Joon Ahn and
               Ziming Zhao and
               Hongxin Hu},
  title     = {Towards Automated Risk Assessment and Mitigation of Mobile Applications},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {5},
  pages     = {571--584},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2366457},
  doi       = {10.1109/TDSC.2014.2366457},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/JingAZH15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JungLW15,
  author    = {Taeho Jung and
               Xiang{-}Yang Li and
               Meng Wan},
  title     = {Collusion-Tolerable Privacy-Preserving Sum and Product Calculation
               without Secure Channel},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {1},
  pages     = {45--57},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2309134},
  doi       = {10.1109/TDSC.2014.2309134},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/JungLW15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KholidyBH15,
  author    = {Hisham A. Kholidy and
               Fabrizio Baiardi and
               Salim Hariri},
  title     = {{DDSGA:} {A} Data-Driven Semi-Global Alignment Approach for Detecting
               Masquerade Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {2},
  pages     = {164--178},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2327966},
  doi       = {10.1109/TDSC.2014.2327966},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KholidyBH15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KlinkhamerE15,
  author    = {Alex P. Klinkhamer and
               Ali Ebnenasir},
  title     = {On the Hardness of Adding Nonmasking Fault Tolerance},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {3},
  pages     = {338--350},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2315191},
  doi       = {10.1109/TDSC.2014.2315191},
  timestamp = {Thu, 25 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/KlinkhamerE15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LeT15,
  author    = {Michael Le and
               Yuval Tamir},
  title     = {Fault Injection in Virtualized Systems - Challenges and Applications},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {3},
  pages     = {284--297},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2334300},
  doi       = {10.1109/TDSC.2014.2334300},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LeT15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiZZS15,
  author    = {Qi Li and
               Xinwen Zhang and
               Xin Zhang and
               Purui Su},
  title     = {Invalidating Idealized {BGP} Security Proposals and Countermeasures},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {3},
  pages     = {298--311},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2345381},
  doi       = {10.1109/TDSC.2014.2345381},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiZZS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuLK15,
  author    = {Sisi Liu and
               Loukas Lazos and
               Marwan Krunz},
  title     = {Time-Delayed Broadcasting for Defeating Inside Jammers},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {3},
  pages     = {351--365},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2334308},
  doi       = {10.1109/TDSC.2014.2334308},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiuLK15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LuWW15,
  author    = {Zhuo Lu and
               Wenye Wang and
               Cliff Wang},
  title     = {Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications
               under Jamming},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {1},
  pages     = {31--44},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2316795},
  doi       = {10.1109/TDSC.2014.2316795},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LuWW15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LvM015,
  author    = {Xixiang Lv and
               Yi Mu and
               Hui Li},
  title     = {Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {6},
  pages     = {615--625},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2382601},
  doi       = {10.1109/TDSC.2014.2382601},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LvM015.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Megias15,
  author    = {David Meg{\'{\i}}as},
  title     = {Improved Privacy-Preserving {P2P} Multimedia Distribution Based on
               Recombined Fingerprints},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {2},
  pages     = {179--189},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2320712},
  doi       = {10.1109/TDSC.2014.2320712},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Megias15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MitchellC15,
  author    = {Robert Mitchell and
               Ing{-}Ray Chen},
  title     = {Behavior Rule Specification-Based Intrusion Detection for Safety Critical
               Medical Cyber Physical Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {1},
  pages     = {16--30},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2312327},
  doi       = {10.1109/TDSC.2014.2312327},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MitchellC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MohaisenMZXK15,
  author    = {Aziz Mohaisen and
               Hesham Mekky and
               Xinwen Zhang and
               Haiyong Xie and
               Yongdae Kim},
  title     = {Timing Attacks on Access Privacy in Information Centric Networks and
               Countermeasures},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {6},
  pages     = {675--687},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2382592},
  doi       = {10.1109/TDSC.2014.2382592},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MohaisenMZXK15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MullerF15,
  author    = {Tilo M{\"{u}}ller and
               Felix C. Freiling},
  title     = {A Systematic Assessment of the Security of Full Disk Encryption},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {5},
  pages     = {491--503},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2369041},
  doi       = {10.1109/TDSC.2014.2369041},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MullerF15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NewellOTNA15,
  author    = {Andrew Newell and
               Daniel Obenshain and
               Thomas Tantillo and
               Cristina Nita{-}Rotaru and
               Yair Amir},
  title     = {Increasing Network Resiliency by Optimally Assigning Diverse Variants
               to Routing Nodes},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {6},
  pages     = {602--614},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2373392},
  doi       = {10.1109/TDSC.2014.2373392},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/NewellOTNA15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NiZCK15,
  author    = {Siru Ni and
               Yi Zhuang and
               Zining Cao and
               Xiangying Kong},
  title     = {Modeling Dependability Features for Real-Time Embedded Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {2},
  pages     = {190--203},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2320714},
  doi       = {10.1109/TDSC.2014.2320714},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/NiZCK15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PhungMSHV15,
  author    = {Phu H. Phung and
               Maliheh Monshizadeh and
               Meera Sridhar and
               Kevin W. Hamlen and
               V. N. Venkatakrishnan},
  title     = {Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party
               Web Content},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {4},
  pages     = {443--457},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2355847},
  doi       = {10.1109/TDSC.2014.2355847},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PhungMSHV15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PrakashVYL15,
  author    = {Aravind Prakash and
               Eknath Venkataramani and
               Heng Yin and
               Zhiqiang Lin},
  title     = {On the Trustworthiness of Memory Analysis - An Empirical Study from
               the Perspective of Binary Execution},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {5},
  pages     = {557--570},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2366464},
  doi       = {10.1109/TDSC.2014.2366464},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/PrakashVYL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RadhakrishnanUB15,
  author    = {Sakthi Vignesh Radhakrishnan and
               A. Selcuk Uluagac and
               Raheem A. Beyah},
  title     = {{GTID:} {A} Technique for Physical Device and Device Type Fingerprinting},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {5},
  pages     = {519--532},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2369033},
  doi       = {10.1109/TDSC.2014.2369033},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RadhakrishnanUB15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RamseyMTG15,
  author    = {Benjamin W. P. Ramsey and
               Barry E. Mullins and
               Michael A. Temple and
               Michael R. Grimaila},
  title     = {Wireless Intrusion Detection and Device Fingerprinting through Preamble
               Manipulation},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {5},
  pages     = {585--596},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2366455},
  doi       = {10.1109/TDSC.2014.2366455},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RamseyMTG15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RenesseSS15,
  author    = {Robbert van Renesse and
               Nicolas Schiper and
               Fred B. Schneider},
  title     = {Vive La Diff{\'{e}}rence: Paxos vs. Viewstamped Replication vs.
               Zab},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {4},
  pages     = {472--484},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2355848},
  doi       = {10.1109/TDSC.2014.2355848},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RenesseSS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RezvaniIBJ15,
  author    = {Mohsen Rezvani and
               Aleksandar Ignjatovic and
               Elisa Bertino and
               Sanjay K. Jha},
  title     = {Secure Data Aggregation Technique for Wireless Sensor Networks in
               the Presence of Collusion Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {1},
  pages     = {98--110},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2316816},
  doi       = {10.1109/TDSC.2014.2316816},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RezvaniIBJ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SharBT15,
  author    = {Lwin Khin Shar and
               Lionel C. Briand and
               Hee Beng Kuan Tan},
  title     = {Web Application Vulnerability Prediction Using Hybrid Program Analysis
               and Machine Learning},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {6},
  pages     = {688--707},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2373377},
  doi       = {10.1109/TDSC.2014.2373377},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SharBT15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShebaroOB15,
  author    = {Bilal Shebaro and
               Oyindamola Oluwatimi and
               Elisa Bertino},
  title     = {Context-Based Access Control Systems for Mobile Devices},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {2},
  pages     = {150--163},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2320731},
  doi       = {10.1109/TDSC.2014.2320731},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ShebaroOB15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SultanaGBS15,
  author    = {Salmin Sultana and
               Gabriel Ghinita and
               Elisa Bertino and
               Mohamed Shehab},
  title     = {A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet
               DropAttacks in Wireless Sensor Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {3},
  pages     = {256--269},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2013.44},
  doi       = {10.1109/TDSC.2013.44},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SultanaGBS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SundaresanDPZ15,
  author    = {Saravanan Sundaresan and
               Robin Doss and
               Selwyn Piramuthu and
               Wanlei Zhou},
  title     = {Secure Tag Search in {RFID} Systems Using Mobile Readers},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {2},
  pages     = {230--242},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2302305},
  doi       = {10.1109/TDSC.2014.2302305},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SundaresanDPZ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TapiadorORR15,
  author    = {Juan E. Tapiador and
               Agust{\'{\i}}n Orfila and
               Arturo Ribagorda and
               Benjam{\'{\i}}n Ramos},
  title     = {Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {3},
  pages     = {312--325},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2013.39},
  doi       = {10.1109/TDSC.2013.39},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/TapiadorORR15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangHWC15,
  author    = {Ding Wang and
               Debiao He and
               Ping Wang and
               Chao{-}Hsien Chu},
  title     = {Anonymous Two-Factor Authentication in Distributed Systems: Certain
               Goals Are Beyond Attainment},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {4},
  pages     = {428--442},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2355850},
  doi       = {10.1109/TDSC.2014.2355850},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangHWC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangKII15,
  author    = {Long Wang and
               Zbigniew Kalbarczyk and
               Ravishankar K. Iyer and
               Arun Iyengar},
  title     = {VM-{\(\mu\)}Checkpoint: Design, Modeling, and Assessment of Lightweight
               In-Memory {VM} Checkpointing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {2},
  pages     = {243--255},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2327967},
  doi       = {10.1109/TDSC.2014.2327967},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangKII15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WolfCHUT15,
  author    = {Tilman Wolf and
               Harikrishnan Kumarapillai Chandrikakutty and
               Kekai Hu and
               Deepak Unnikrishnan and
               Russell Tessier},
  title     = {Securing Network Processors with High-Performance Hardware Monitors},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {6},
  pages     = {652--664},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2373378},
  doi       = {10.1109/TDSC.2014.2373378},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WolfCHUT15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WuWCCL15,
  author    = {Chin{-}Hsien Wu and
               Po{-}Han Wu and
               Kuo{-}Long Chen and
               Wen{-}Yen Chang and
               Kun{-}Cheng Lai},
  title     = {A Hotness Filter of Files for Reliable Non-Volatile Memory Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {4},
  pages     = {375--386},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2015.2399313},
  doi       = {10.1109/TDSC.2015.2399313},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WuWCCL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuS15,
  author    = {Zhongyuan Xu and
               Scott D. Stoller},
  title     = {Mining Attribute-Based Access Control Policies},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {5},
  pages     = {533--545},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2369048},
  doi       = {10.1109/TDSC.2014.2369048},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/XuS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangC15,
  author    = {Jia{-}Dong Zhang and
               Chi{-}Yin Chow},
  title     = {{REAL:} {A} Reciprocal Protocol for Location Privacy in Wireless Sensor
               Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {4},
  pages     = {458--471},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2366467},
  doi       = {10.1109/TDSC.2014.2366467},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhangC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhongBLA15,
  author    = {Yuhui Zhong and
               Bharat K. Bhargava and
               Yi Lu and
               Pelin Angin},
  title     = {A Computational Dynamic Trust Model for User Authorization},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {1},
  pages     = {1--15},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2309126},
  doi       = {10.1109/TDSC.2014.2309126},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhongBLA15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhuHHT15,
  author    = {Youwen Zhu and
               Zhiqiu Huang and
               Liusheng Huang and
               Tsuyoshi Takagi},
  title     = {On the Security of {A} Privacy-Preserving Product Calculation Scheme},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {12},
  number    = {3},
  pages     = {373--374},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2345404},
  doi       = {10.1109/TDSC.2014.2345404},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhuHHT15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AlmohriYK14,
  author    = {Hussain M. J. Almohri and
               Danfeng Yao and
               Dennis G. Kafura},
  title     = {Process Authentication for High System Assurance},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {2},
  pages     = {168--180},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.29},
  doi       = {10.1109/TDSC.2013.29},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AlmohriYK14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BasilicoGMS14,
  author    = {Nicola Basilico and
               Nicola Gatti and
               Mattia Monga and
               Sabrina Sicari},
  title     = {Security Games for Node Localization through Verifiable Multilateration},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {1},
  pages     = {72--85},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.30},
  doi       = {10.1109/TDSC.2013.30},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BasilicoGMS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Bertino14,
  author    = {Elisa Bertino},
  title     = {Editorial},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {1},
  pages     = {1},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2014.3},
  doi       = {10.1109/TDSC.2014.3},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Bertino14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CesareXZ14,
  author    = {Silvio Cesare and
               Yang Xiang and
               Wanlei Zhou},
  title     = {Control Flow-Based Malware VariantDetection},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {4},
  pages     = {307--317},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.40},
  doi       = {10.1109/TDSC.2013.40},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CesareXZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CheekS14,
  author    = {Gorrell P. Cheek and
               Mohamed Shehab},
  title     = {Human Effects of Enhanced Privacy Management Models},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {2},
  pages     = {142--154},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.34},
  doi       = {10.1109/TDSC.2013.34},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CheekS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChoLL14,
  author    = {Kwantae Cho and
               Byung{-}Gil Lee and
               Dong Hoon Lee},
  title     = {Low-Priced and Energy-Efficient Detection of Replicas for Wireless
               Sensor Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {5},
  pages     = {454--466},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.41},
  doi       = {10.1109/TDSC.2013.41},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChoLL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ColomboF14,
  author    = {Pietro Colombo and
               Elena Ferrari},
  title     = {Enforcing Obligations within RelationalDatabase Management Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {4},
  pages     = {318--331},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.48},
  doi       = {10.1109/TDSC.2013.48},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ColomboF14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FiorinS14,
  author    = {Leandro Fiorin and
               Mariagiovanna Sami},
  title     = {Fault-Tolerant Network Interfaces for Networks-on-Chip},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {1},
  pages     = {16--29},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.28},
  doi       = {10.1109/TDSC.2013.28},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/FiorinS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FoketSB14,
  author    = {Christophe Foket and
               Bjorn De Sutter and
               Koen De Bosschere},
  title     = {Pushing Java Type Obfuscation to the Limit},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {6},
  pages     = {553--567},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2014.2305990},
  doi       = {10.1109/TDSC.2014.2305990},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/FoketSB14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FonsecaSVM14,
  author    = {Jos{\'{e}} Fonseca and
               Nuno Seixas and
               Marco Vieira and
               Henrique Madeira},
  title     = {Analysis of Field Data on Web Security Vulnerabilities},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {2},
  pages     = {89--100},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.37},
  doi       = {10.1109/TDSC.2013.37},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/FonsecaSVM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FonsecaVM14,
  author    = {Jos{\'{e}} Fonseca and
               Marco Vieira and
               Henrique Madeira},
  title     = {Evaluation of Web Security Mechanisms Using Vulnerability {\&}
               Attack Injection},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {5},
  pages     = {440--453},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.45},
  doi       = {10.1109/TDSC.2013.45},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/FonsecaVM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GatesCLP14,
  author    = {Christopher S. Gates and
               Jing Chen and
               Ninghui Li and
               Robert W. Proctor},
  title     = {Effective Risk Communication for Android Apps},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {3},
  pages     = {252--265},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.58},
  doi       = {10.1109/TDSC.2013.58},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/GatesCLP14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GatesLPSQPNM14,
  author    = {Christopher S. Gates and
               Ninghui Li and
               Hao Peng and
               Bhaskar Pratim Sarma and
               Yuan Qi and
               Rahul Potharaju and
               Cristina Nita{-}Rotaru and
               Ian Molloy},
  title     = {Generating Summary Risk Scores for Mobile Applications},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {3},
  pages     = {238--251},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2014.2302293},
  doi       = {10.1109/TDSC.2014.2302293},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/GatesLPSQPNM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuptaSX14,
  author    = {Puneet Gupta and
               Scott D. Stoller and
               Zhongyuan Xu},
  title     = {Abductive Analysis of Administrative Policies in Rule-Based Access
               Control},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {5},
  pages     = {412--424},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.42},
  doi       = {10.1109/TDSC.2013.42},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/GuptaSX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HanLC14,
  author    = {Kyuseung Han and
               Ganghee Lee and
               Kiyoung Choi},
  title     = {Software-Level Approaches for Tolerating Transient Faults in a Coarse-GrainedReconfigurable
               Architecture},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {4},
  pages     = {392--398},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.54},
  doi       = {10.1109/TDSC.2013.54},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HanLC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Holm14,
  author    = {Hannes Holm},
  title     = {A Large-Scale Study of the Time Required to Compromise a Computer
               System},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {1},
  pages     = {2--15},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.21},
  doi       = {10.1109/TDSC.2013.21},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Holm14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HuangQZKX14,
  author    = {Jianzhong Huang and
               Xiao Qin and
               Fenghao Zhang and
               Wei{-}Shinn Ku and
               Changsheng Xie},
  title     = {{MFTS:} {A} Multi-Level Fault-Tolerant Archiving Storage with Optimized
               Maintenance Bandwidth},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {6},
  pages     = {524--537},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2014.2304296},
  doi       = {10.1109/TDSC.2014.2304296},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HuangQZKX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Lee14,
  author    = {Younho Lee},
  title     = {Secure Ordered Bucketization},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {3},
  pages     = {292--303},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2014.2313863},
  doi       = {10.1109/TDSC.2014.2313863},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Lee14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiCP14,
  author    = {Qinghua Li and
               Guohong Cao and
               Thomas F. La Porta},
  title     = {Efficient and Privacy-Aware Data Aggregation in Mobile Sensing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {2},
  pages     = {115--129},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.31},
  doi       = {10.1109/TDSC.2013.31},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiCP14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiWC14,
  author    = {Xin Li and
               Xinyuan Wang and
               Wentao Chang},
  title     = {CipherXRay: Exposing Cryptographic Operations and Transient Secrets
               from Monitored Binary Execution},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {2},
  pages     = {101--114},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2012.83},
  doi       = {10.1109/TDSC.2012.83},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiWC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiberatoreLSL14,
  author    = {Marc Liberatore and
               Brian Neil Levine and
               Clay Shields and
               Brian Lynn},
  title     = {Efficient Tagging of Remote Peers during Child Pornography Investigations},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {5},
  pages     = {425--439},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.46},
  doi       = {10.1109/TDSC.2013.46},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiberatoreLSL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuWCRZD14,
  author    = {Wen Ming Liu and
               Lingyu Wang and
               Pengsu Cheng and
               Kui Ren and
               Shunzhi Zhu and
               Mourad Debbabi},
  title     = {{PPTP:} Privacy-Preserving Traffic Padding in Web-Based Applications},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {6},
  pages     = {538--552},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2014.2302308},
  doi       = {10.1109/TDSC.2014.2302308},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiuWCRZD14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MerloMGPC14,
  author    = {Alessio Merlo and
               Mauro Migliardi and
               Nicola Gobbo and
               Francesco Palmieri and
               Aniello Castiglione},
  title     = {A Denial of Service Attack to {UMTS} Networks Using SIM-Less Devices},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {3},
  pages     = {280--291},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2014.2315198},
  doi       = {10.1109/TDSC.2014.2315198},
  timestamp = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/MerloMGPC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MohammedAFD14,
  author    = {Noman Mohammed and
               Dima Alhadidi and
               Benjamin C. M. Fung and
               Mourad Debbabi},
  title     = {Secure Two-Party Differentially Private Data Release for Vertically
               Partitioned Data},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {1},
  pages     = {59--71},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.22},
  doi       = {10.1109/TDSC.2013.22},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MohammedAFD14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/OthmaneAWB14,
  author    = {Lotfi Ben Othmane and
               Pelin Angin and
               Harold Weffers and
               Bharat K. Bhargava},
  title     = {Extending the Agile Development Process to Develop Acceptably Secure
               Software},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {6},
  pages     = {497--509},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2014.2298011},
  doi       = {10.1109/TDSC.2014.2298011},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/OthmaneAWB14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PolcakJM14,
  author    = {Libor Polcak and
               Jakub Jirasek and
               Petr Matousek},
  title     = {Comment on "Remote Physical Device Fingerprinting"},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {5},
  pages     = {494--496},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.26},
  doi       = {10.1109/TDSC.2013.26},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PolcakJM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/QinHL14,
  author    = {Yang Qin and
               Dijiang Huang and
               Bing Li},
  title     = {{STARS:} {A} Statistical Traffic Pattern Discovery System for MANETs},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {2},
  pages     = {181--192},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.33},
  doi       = {10.1109/TDSC.2013.33},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/QinHL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RahulamathavanPVCR14,
  author    = {Yogachandran Rahulamathavan and
               Raphael Chung{-}Wei Phan and
               Suresh Veluru and
               Kanapathippillai Cumanan and
               Muttukrishnan Rajarajan},
  title     = {Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing
               the Data Classification in Cloud},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {5},
  pages     = {467--479},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.51},
  doi       = {10.1109/TDSC.2013.51},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RahulamathavanPVCR14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SalakoS14,
  author    = {Kizito Salako and
               Lorenzo Strigini},
  title     = {When Does "Diversity" in Development Reduce Common Failures? Insights
               from Probabilistic Modeling},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {2},
  pages     = {193--206},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.32},
  doi       = {10.1109/TDSC.2013.32},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SalakoS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShokriTPKH14,
  author    = {Reza Shokri and
               George Theodorakopoulos and
               Panos Papadimitratos and
               Ehsan Kazemi and
               Jean{-}Pierre Hubaux},
  title     = {Hiding in the Mobile Crowd: LocationPrivacy through Collaboration},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {3},
  pages     = {266--279},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.57},
  doi       = {10.1109/TDSC.2013.57},
  timestamp = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ShokriTPKH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SkillenM14,
  author    = {Adam Skillen and
               Mohammad Mannan},
  title     = {Mobiflage: Deniable Storage Encryptionfor Mobile Devices},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {3},
  pages     = {224--237},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.56},
  doi       = {10.1109/TDSC.2013.56},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SkillenM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TangCHS14,
  author    = {Jin Tang and
               Yu Cheng and
               Yong Hao and
               Wei Song},
  title     = {{SIP} Flooding Attack Detection with a Multi-Dimensional Sketch Design},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {6},
  pages     = {582--595},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2014.2302298},
  doi       = {10.1109/TDSC.2014.2302298},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/TangCHS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TianCW14,
  author    = {Wenhong Tian and
               Yu Chen and
               Xinyang Wang},
  title     = {A Note on "Orchestrating an Ensemble of MapReduce Jobs for Minimizing
               Their Makespan"},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {4},
  pages     = {390--391},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.55},
  doi       = {10.1109/TDSC.2013.55},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/TianCW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VadlamudiC14,
  author    = {Satya Gautam Vadlamudi and
               Partha Pratim Chakrabarti},
  title     = {Robustness Analysis of Embedded Control Systems with Respect to Signal
               Perturbations: Finding Minimal Counterexamples Using Fault Injection},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {1},
  pages     = {45--58},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.23},
  doi       = {10.1109/TDSC.2013.23},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/VadlamudiC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VaidyaSFML14,
  author    = {Jaideep Vaidya and
               Basit Shafiq and
               Wei Fan and
               Danish Mehmood and
               David Lorenzi},
  title     = {A Random Decision Tree Framework for Privacy-Preserving Data Mining},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {5},
  pages     = {399--411},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.43},
  doi       = {10.1109/TDSC.2013.43},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/VaidyaSFML14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VimercatiFJLPS14,
  author    = {Sabrina De Capitani di Vimercati and
               Sara Foresti and
               Sushil Jajodia and
               Giovanni Livraga and
               Stefano Paraboschi and
               Pierangela Samarati},
  title     = {Fragmentation in Presence of Data Dependencies},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {6},
  pages     = {510--523},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.2295798},
  doi       = {10.1109/TDSC.2013.2295798},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/VimercatiFJLPS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangJSCN14,
  author    = {Lingyu Wang and
               Sushil Jajodia and
               Anoop Singhal and
               Pengsu Cheng and
               Steven Noel},
  title     = {k-Zero Day Safety: {A} Network Security Metric for Measuring the Risk
               of Unknown Vulnerabilities},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {1},
  pages     = {30--44},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.24},
  doi       = {10.1109/TDSC.2013.24},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangJSCN14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WenZZXZJZ14,
  author    = {Sheng Wen and
               Wei Zhou and
               Jun Zhang and
               Yang Xiang and
               Wanlei Zhou and
               Weijia Jia and
               Cliff C. Zou},
  title     = {Modeling and Analysis on the Propagation Dynamics of Modern Email
               Malware},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {4},
  pages     = {361--374},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.49},
  doi       = {10.1109/TDSC.2013.49},
  timestamp = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/WenZZXZJZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XiaYLMT14,
  author    = {Ruofan Xia and
               Xiaoyan Yin and
               Javier Alonso Lopez and
               Fumio Machida and
               Kishor S. Trivedi},
  title     = {Performance and Availability Modeling of ITSystems with Data Backup
               and Restore},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {4},
  pages     = {375--389},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.50},
  doi       = {10.1109/TDSC.2013.50},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/XiaYLMT14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuRCFMO14,
  author    = {Yi Xu and
               Gerardo Reynaga and
               Sonia Chiasson and
               Jan{-}Michael Frahm and
               Fabian Monrose and
               Paul C. van Oorschot},
  title     = {Security Analysis and Related Usability of Motion-Based CAPTCHAs:
               Decoding Codewords in Motion},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {5},
  pages     = {480--493},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.52},
  doi       = {10.1109/TDSC.2013.52},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/XuRCFMO14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YiBVX14,
  author    = {Xun Yi and
               Elisa Bertino and
               Jaideep Vaidya and
               Chaoping Xing},
  title     = {Private Searching on Streaming Data Based on Keyword Frequency},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {2},
  pages     = {155--167},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.36},
  doi       = {10.1109/TDSC.2013.36},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/YiBVX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YinRMQL14,
  author    = {Shu Yin and
               Xiaojun Ruan and
               Adam Manzanares and
               Xiao Qin and
               Kenli Li},
  title     = {{MINT:} {A} Reliability Modeling Frameworkfor Energy-Efficient Parallel
               Disk Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {4},
  pages     = {345--360},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.47},
  doi       = {10.1109/TDSC.2013.47},
  timestamp = {Thu, 15 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/YinRMQL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangWSS14,
  author    = {Fengwei Zhang and
               Jiang Wang and
               Kun Sun and
               Angelos Stavrou},
  title     = {HyperCheck: {A} Hardware-AssistedIntegrity Monitor},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {4},
  pages     = {332--344},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.53},
  doi       = {10.1109/TDSC.2013.53},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhangWSS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhaoTGAW14,
  author    = {Jing Zhao and
               Kishor S. Trivedi and
               Michael Grottke and
               Javier Alonso and
               Yanbin Wang},
  title     = {Ensuring the Performance of Apache {HTTP} Server Affected by Aging},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {2},
  pages     = {130--141},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.38},
  doi       = {10.1109/TDSC.2013.38},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhaoTGAW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhauniarovichRCCF14,
  author    = {Yury Zhauniarovich and
               Giovanni Russello and
               Mauro Conti and
               Bruno Crispo and
               Earlence Fernandes},
  title     = {{MOSES:} Supporting and Enforcing Security Profiles on Smartphones},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {3},
  pages     = {211--223},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2014.2300482},
  doi       = {10.1109/TDSC.2014.2300482},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhauniarovichRCCF14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AddisAPS013,
  author    = {Bernardetta Addis and
               Danilo Ardagna and
               Barbara Panicucci and
               Mark S. Squillante and
               Li Zhang},
  title     = {A Hierarchical Approach for the Resource Management of Very Large
               Cloud Platforms},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {5},
  pages     = {253--272},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2013.4},
  doi       = {10.1109/TDSC.2013.4},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AddisAPS013.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AlamriBT13,
  author    = {Abdullah Alamri and
               Peter Bert{\'{o}}k and
               James A. Thom},
  title     = {Authorization Control for a Semantic Data Repository through an Inference
               Policy Engine},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {6},
  pages     = {328--340},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2013.20},
  doi       = {10.1109/TDSC.2013.20},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AlamriBT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BiskupL13,
  author    = {Joachim Biskup and
               Lan Li},
  title     = {On Inference-Proof View Processing of {XML} Documents},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {2},
  pages     = {99--113},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2012.86},
  doi       = {10.1109/TDSC.2012.86},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BiskupL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BohliGJIM13,
  author    = {Jens{-}Matthias Bohli and
               Nils Gruschka and
               Meiko Jensen and
               Luigi Lo Iacono and
               Ninja Marnau},
  title     = {Security and Privacy-Enhancing Multicloud Architectures},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {4},
  pages     = {212--224},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2013.6},
  doi       = {10.1109/TDSC.2013.6},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BohliGJIM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BrunM13,
  author    = {Yuriy Brun and
               Nenad Medvidovic},
  title     = {Entrusting Private Computation and Data to Untrusted Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {4},
  pages     = {225--238},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2013.13},
  doi       = {10.1109/TDSC.2013.13},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BrunM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CanB13,
  author    = {Ahmet Burak Can and
               Bharat K. Bhargava},
  title     = {{SORT:} {A} Self-ORganizing Trust Model for Peer-to-Peer Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {1},
  pages     = {14--27},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2012.74},
  doi       = {10.1109/TDSC.2012.74},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CanB13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CarminatiFG13,
  author    = {Barbara Carminati and
               Elena Ferrari and
               Michele Guglielmi},
  title     = {A System for Timely and Controlled Information Sharing in Emergency
               Situations},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {3},
  pages     = {129--142},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2013.11},
  doi       = {10.1109/TDSC.2013.11},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CarminatiFG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChenJZZLZS13,
  author    = {Gang Chen and
               Hai Jin and
               Deqing Zou and
               Bing Bing Zhou and
               Zhenkai Liang and
               Weide Zheng and
               Xuanhua Shi},
  title     = {SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {6},
  pages     = {368--379},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2013.25},
  doi       = {10.1109/TDSC.2013.25},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChenJZZLZS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChungKXLH13,
  author    = {Chun{-}Jen Chung and
               Pankaj Khatkar and
               Tianyi Xing and
               Jeongkeun Lee and
               Dijiang Huang},
  title     = {{NICE:} Network Intrusion Detection and Countermeasure Selection in
               Virtual Network Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {4},
  pages     = {198--211},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2013.8},
  doi       = {10.1109/TDSC.2013.8},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChungKXLH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CostaPBC13,
  author    = {Pedro Costa and
               Marcelo Pasin and
               Alysson Neves Bessani and
               Miguel P. Correia},
  title     = {On the Performance of Byzantine Fault-Tolerant MapReduce},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {5},
  pages     = {301--313},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2013.7},
  doi       = {10.1109/TDSC.2013.7},
  timestamp = {Tue, 06 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CostaPBC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DistefanoPT13,
  author    = {Salvatore Distefano and
               Antonio Puliafito and
               Kishor S. Trivedi},
  title     = {Guest Editors' Introduction: Special Section on Cloud Computing Assessment:
               Metrics, Algorithms, Policies, Models, and Evaluation Techniques},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {4},
  pages     = {196--197},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2013.27},
  doi       = {10.1109/TDSC.2013.27},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/DistefanoPT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DistefanoPT13a,
  author    = {Salvatore Distefano and
               Antonio Puliafito and
               Kishor S. Trivedi},
  title     = {Guest Editors' Introduction: Special Section on Cloud Computing Assessment:
               Metrics, Algorithms, Policies, Models, and Evaluation Techniques},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {5},
  pages     = {251--252},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2013.35},
  doi       = {10.1109/TDSC.2013.35},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/DistefanoPT13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DuanPL13,
  author    = {Lide Duan and
               Lu Peng and
               Bin Li},
  title     = {Predicting Architectural Vulnerability on Multithreaded Processors
               under Resource Contention and Sharing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {2},
  pages     = {114--127},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2012.87},
  doi       = {10.1109/TDSC.2012.87},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/DuanPL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FreudigerMHP13,
  author    = {Julien Freudiger and
               Mohammad Hossein Manshaei and
               Jean{-}Pierre Hubaux and
               David C. Parkes},
  title     = {Non-Cooperative Location Privacy},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {2},
  pages     = {84--98},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2012.85},
  doi       = {10.1109/TDSC.2012.85},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/FreudigerMHP13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HermenierLM13,
  author    = {Fabien Hermenier and
               Julia L. Lawall and
               Gilles Muller},
  title     = {BtrPlace: {A} Flexible Consolidation Manager for Highly Available
               Applications},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {5},
  pages     = {273--286},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2013.5},
  doi       = {10.1109/TDSC.2013.5},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HermenierLM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HuAK13,
  author    = {Hongxin Hu and
               Gail{-}Joon Ahn and
               Ketan Kulkarni},
  title     = {Discovery and Resolution of Anomalies in Web Access Control Policies},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {6},
  pages     = {341--354},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2013.18},
  doi       = {10.1109/TDSC.2013.18},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HuAK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LeeK13,
  author    = {Sangho Lee and
               Jong Kim},
  title     = {WarningBird: {A} Near Real-Time Detection System for Suspicious URLs
               in Twitter Stream},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {3},
  pages     = {183--195},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2013.3},
  doi       = {10.1109/TDSC.2013.3},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LeeK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiGZC13,
  author    = {Qinghua Li and
               Wei Gao and
               Sencun Zhu and
               Guohong Cao},
  title     = {To Lie or to Comply: Defending against Flood Attacks in Disruption
               Tolerant Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {3},
  pages     = {168--182},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2012.84},
  doi       = {10.1109/TDSC.2012.84},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiGZC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaSXZ13,
  author    = {Di Ma and
               Nitesh Saxena and
               Tuo Xiang and
               Yan Zhu},
  title     = {Location-Aware and Safer Cards: Enhancing {RFID} Security and Privacy
               via Location Sensing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {2},
  pages     = {57--69},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2012.89},
  doi       = {10.1109/TDSC.2012.89},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MaSXZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MohaisenKVKK13,
  author    = {Abedelaziz Mohaisen and
               Denis Foo Kune and
               Eugene Y. Vasserman and
               Myungsun Kim and
               Yongdae Kim},
  title     = {Secure Encounter-Based Mobile Social Networks: Requirements, Designs,
               and Tradeoffs},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {6},
  pages     = {380--393},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2013.19},
  doi       = {10.1109/TDSC.2013.19},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MohaisenKVKK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/OrtolaniGC13,
  author    = {Stefano Ortolani and
               Cristiano Giuffrida and
               Bruno Crispo},
  title     = {Unprivileged Black-Box Detection of User-Space Keyloggers},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {1},
  pages     = {40--52},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2012.76},
  doi       = {10.1109/TDSC.2012.76},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/OrtolaniGC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PapagianniLP13,
  author    = {Chrysa A. Papagianni and
               Aris Leivadeas and
               Symeon Papavassiliou},
  title     = {A Cloud-Oriented Content Delivery Network Paradigm: Modeling and Assessment},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {5},
  pages     = {287--300},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2013.12},
  doi       = {10.1109/TDSC.2013.12},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PapagianniLP13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PoturalskiPH13,
  author    = {Marcin Poturalski and
               Panos Papadimitratos and
               Jean{-}Pierre Hubaux},
  title     = {Formal Analysis of Secure Neighbor Discovery in Wireless Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {6},
  pages     = {355--367},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2013.17},
  doi       = {10.1109/TDSC.2013.17},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PoturalskiPH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RafnssonNS13,
  author    = {Willard Rafnsson and
               Keiko Nakata and
               Andrei Sabelfeld},
  title     = {Securing Class Initialization in Java-like Languages},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {1},
  pages     = {1--13},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2012.73},
  doi       = {10.1109/TDSC.2012.73},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RafnssonNS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Raguram0XFGM13,
  author    = {Rahul Raguram and
               Andrew M. White and
               Yi Xu and
               Jan{-}Michael Frahm and
               Pierre Georgel and
               Fabian Monrose},
  title     = {On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction
               of Typed Input from Compromising Reflections},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {3},
  pages     = {154--167},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2013.16},
  doi       = {10.1109/TDSC.2013.16},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Raguram0XFGM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Shan0C13,
  author    = {Zhiyong Shan and
               Xin Wang and
               Tzi{-}cker Chiueh},
  title     = {Malware Clearance for Secure Commitment of OS-Level Virtual Machines},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {2},
  pages     = {70--83},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2012.88},
  doi       = {10.1109/TDSC.2012.88},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Shan0C13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TripunitaraL13,
  author    = {Mahesh V. Tripunitara and
               Ninghui Li},
  title     = {The Foundational Work of Harrison-Ruzzo-Ullman Revisited},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {1},
  pages     = {28--39},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2012.77},
  doi       = {10.1109/TDSC.2012.77},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/TripunitaraL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VermaCC13,
  author    = {Abhishek Verma and
               Ludmila Cherkasova and
               Roy H. Campbell},
  title     = {Orchestrating an Ensemble of MapReduce Jobs for Minimizing Their Makespan},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {5},
  pages     = {314--327},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2013.14},
  doi       = {10.1109/TDSC.2013.14},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/VermaCC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuBSY13,
  author    = {Kui Xu and
               Patrick Butler and
               Sudip Saha and
               Danfeng (Daphne) Yao},
  title     = {{DNS} for Massive-Scale Command and Control},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {3},
  pages     = {143--153},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2013.10},
  doi       = {10.1109/TDSC.2013.10},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/XuBSY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YuLZXL13,
  author    = {Jiadi Yu and
               Peng Lu and
               Yanmin Zhu and
               Guangtao Xue and
               Minglu Li},
  title     = {Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {10},
  number    = {4},
  pages     = {239--250},
  year      = {2013},
  url       = {https://doi.org/10.1109/TDSC.2013.9},
  doi       = {10.1109/TDSC.2013.9},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/YuLZXL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AlsalehMO12,
  author    = {Mansour Alsaleh and
               Mohammad Mannan and
               Paul C. van Oorschot},
  title     = {Revisiting Defenses against Large-Scale Online Password Guessing Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {1},
  pages     = {128--141},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.24},
  doi       = {10.1109/TDSC.2011.24},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AlsalehMO12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AydayF12,
  author    = {Erman Ayday and
               Faramarz Fekri},
  title     = {Iterative Trust and Reputation Management Using Belief Propagation},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {3},
  pages     = {375--386},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.64},
  doi       = {10.1109/TDSC.2011.64},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AydayF12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BarkerG12,
  author    = {Steve Barker and
               Valerio Genovese},
  title     = {Access Control with Privacy Enhancements a Unified Approach},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {5},
  pages     = {670--683},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.22},
  doi       = {10.1109/TDSC.2012.22},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BarkerG12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BarthRSMSB12,
  author    = {Adam Barth and
               Benjamin I. P. Rubinstein and
               Mukund Sundararajan and
               John C. Mitchell and
               Dawn Song and
               Peter L. Bartlett},
  title     = {A Learning-Based Approach to Reactive Security},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {4},
  pages     = {482--493},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.42},
  doi       = {10.1109/TDSC.2011.42},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BarthRSMSB12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BishopEHW12,
  author    = {Matt Bishop and
               Sophie Engle and
               Damien Howard and
               Sean Whalen},
  title     = {A Taxonomy of Buffer Overflow Characteristics},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {3},
  pages     = {305--317},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.10},
  doi       = {10.1109/TDSC.2012.10},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BishopEHW12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BorranHSS12,
  author    = {Fatemeh Borran and
               Martin Hutle and
               Nuno Santos and
               Andr{\'{e}} Schiper},
  title     = {Quantitative Analysis of Consensus Algorithms},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {2},
  pages     = {236--249},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.48},
  doi       = {10.1109/TDSC.2011.48},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BorranHSS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BrickellL12,
  author    = {Ernie Brickell and
               Jiangtao Li},
  title     = {Enhanced Privacy {ID:} {A} Direct Anonymous Attestation Scheme with
               Enhanced Revocation Capabilities},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {3},
  pages     = {345--360},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.63},
  doi       = {10.1109/TDSC.2011.63},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BrickellL12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Chandrasekhar0S12,
  author    = {Santosh Chandrasekhar and
               Saikat Chakrabarti and
               Mukesh Singhal},
  title     = {A Trapdoor Hash-Based Mechanism for Stream Authentication},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {5},
  pages     = {699--713},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.48},
  doi       = {10.1109/TDSC.2012.48},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Chandrasekhar0S12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChangH12,
  author    = {Nai{-}Wen Chang and
               Sun{-}Yuan Hsieh},
  title     = {Conditional Diagnosability of Augmented Cubes under the {PMC} Model},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {1},
  pages     = {46--60},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2010.59},
  doi       = {10.1109/TDSC.2010.59},
  timestamp = {Mon, 29 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChangH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChasakiW12,
  author    = {Danai Chasaki and
               Tilman Wolf},
  title     = {Attacks and Defenses in the Data Plane of Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {6},
  pages     = {798--810},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.50},
  doi       = {10.1109/TDSC.2012.50},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChasakiW12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChenLWH12,
  author    = {Xiaodao Chen and
               Chen Liao and
               Tongquan Wei and
               Shiyan Hu},
  title     = {An Interconnect Reliability-Driven Routing Technique for Electromigration
               Failure Avoidance},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {5},
  pages     = {770--776},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2010.57},
  doi       = {10.1109/TDSC.2010.57},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChenLWH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChenNM12,
  author    = {You Chen and
               Steve Nyemba and
               Bradley A. Malin},
  title     = {Detecting Anomalous Insiders in Collaborative Information Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {3},
  pages     = {332--344},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.11},
  doi       = {10.1109/TDSC.2012.11},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChenNM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChiassonSFBO12,
  author    = {Sonia Chiasson and
               Elizabeth Stobert and
               Alain Forget and
               Robert Biddle and
               Paul C. van Oorschot},
  title     = {Persuasive Cued Click-Points: Design, Implementation, and Evaluation
               of a Knowledge-Based Authentication Mechanism},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {2},
  pages     = {222--235},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.55},
  doi       = {10.1109/TDSC.2011.55},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChiassonSFBO12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChuGWJ12,
  author    = {Zi Chu and
               Steven Gianvecchio and
               Haining Wang and
               Sushil Jajodia},
  title     = {Detecting Automation of Twitter Accounts: Are You a Human, Bot, or
               Cyborg?},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {6},
  pages     = {811--824},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.75},
  doi       = {10.1109/TDSC.2012.75},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChuGWJ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CortinasFGLLPA12,
  author    = {Roberto Corti{\~{n}}as and
               Felix C. Freiling and
               Marjan Ghajar{-}Azadanlou and
               Alberto Lafuente and
               Mikel Larrea and
               Lucia Draque Penso and
               Iratxe Soraluze Arriola},
  title     = {Secure Failure Detection and Consensus in TrustedPals},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {4},
  pages     = {610--625},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.23},
  doi       = {10.1109/TDSC.2012.23},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CortinasFGLLPA12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CucurullANS12,
  author    = {Jordi Cucurull and
               Mikael Asplund and
               Simin Nadjm{-}Tehrani and
               Tiziano Santoro},
  title     = {Surviving Attacks in Challenged Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {6},
  pages     = {917--929},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.67},
  doi       = {10.1109/TDSC.2012.67},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CucurullANS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DaiPJX12,
  author    = {Weiqi Dai and
               T. Paul Parker and
               Hai Jin and
               Shouhuai Xu},
  title     = {Enhancing Data Trustworthiness via Assured Digital Signing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {6},
  pages     = {838--851},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.71},
  doi       = {10.1109/TDSC.2012.71},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/DaiPJX12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DasI12,
  author    = {Anupam Das and
               Mohammad Mahfuzul Islam},
  title     = {SecuredTrust: {A} Dynamic Trust Computation Model for Secured Communication
               in Multiagent Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {2},
  pages     = {261--274},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.57},
  doi       = {10.1109/TDSC.2011.57},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/DasI12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DimitrakakisKM12,
  author    = {Christos Dimitrakakis and
               Tom Karygiannis and
               Aikaterini Mitrokotsa},
  title     = {Guest Editors' Introduction: Special Section on Learning, Games, and
               Security},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {4},
  pages     = {449--450},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.45},
  doi       = {10.1109/TDSC.2012.45},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/DimitrakakisKM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DolevH12,
  author    = {Shlomi Dolev and
               Yinnon A. Haviv},
  title     = {Stabilization Enabling Technology},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {2},
  pages     = {275--288},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.60},
  doi       = {10.1109/TDSC.2011.60},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/DolevH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DongCNY12,
  author    = {Jing Dong and
               Reza Curtmola and
               Cristina Nita{-}Rotaru and
               David K. Y. Yau},
  title     = {Pollution Attacks and Defenses in Wireless Interflow Network Coding
               Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {5},
  pages     = {741--755},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.39},
  doi       = {10.1109/TDSC.2012.39},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/DongCNY12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DuanCSDSB12,
  author    = {Zhenhai Duan and
               Peng Chen and
               Fernando Sanchez and
               Yingfei Dong and
               Mary Stephenson and
               James Michael Barker},
  title     = {Detecting Spam Zombies by Monitoring Outgoing Messages},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {2},
  pages     = {198--210},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.49},
  doi       = {10.1109/TDSC.2011.49},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/DuanCSDSB12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FerrariT12,
  author    = {Elena Ferrari and
               Bhavani M. Thuraisingham},
  title     = {Guest Editors' Introduction: Special Section on Data and Applications
               Security and Privacy},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {5},
  pages     = {625--626},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.58},
  doi       = {10.1109/TDSC.2012.58},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/FerrariT12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FuPT12,
  author    = {Zhang Fu and
               Marina Papatriantafilou and
               Philippas Tsigas},
  title     = {Mitigating Distributed Denial of Service Attacks in Multiparty Applications
               in the Presence of Clock Drifts},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {3},
  pages     = {401--413},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.18},
  doi       = {10.1109/TDSC.2012.18},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/FuPT12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HarelSRE12,
  author    = {Amir Harel and
               Asaf Shabtai and
               Lior Rokach and
               Yuval Elovici},
  title     = {M-Score: {A} Misuseability Weight Measure},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {3},
  pages     = {414--428},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.17},
  doi       = {10.1109/TDSC.2012.17},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HarelSRE12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HerranzNS12,
  author    = {Javier Herranz and
               Jordi Nin and
               Marc Sol{\'{e}}},
  title     = {More Hybrid and Secure Protection of Statistical Data Sets},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {5},
  pages     = {727--740},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.40},
  doi       = {10.1109/TDSC.2012.40},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HerranzNS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HoWD12,
  author    = {Jun{-}Won Ho and
               Matthew K. Wright and
               Sajal K. Das},
  title     = {ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation
               in Wireless Sensor Networks Using Sequential Hypothesis Testing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {4},
  pages     = {494--511},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.65},
  doi       = {10.1109/TDSC.2011.65},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HoWD12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HolmEA12,
  author    = {Hannes Holm and
               Mathias Ekstedt and
               Dennis Andersson},
  title     = {Empirical Analysis of System-Level Vulnerability Metrics through Actual
               Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {6},
  pages     = {825--837},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.66},
  doi       = {10.1109/TDSC.2012.66},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HolmEA12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HuAK12,
  author    = {Hongxin Hu and
               Gail{-}Joon Ahn and
               Ketan Kulkarni},
  title     = {Detecting and Resolving Firewall Policy Anomalies},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {3},
  pages     = {318--331},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.20},
  doi       = {10.1109/TDSC.2012.20},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HuAK12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/IdikaB12,
  author    = {Nwokedi C. Idika and
               Bharat K. Bhargava},
  title     = {Extending Attack Graph-Based Security Metrics and Aggregating Their
               Application},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {1},
  pages     = {75--85},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2010.61},
  doi       = {10.1109/TDSC.2010.61},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/IdikaB12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/InanKGB12,
  author    = {Ali Inan and
               Murat Kantarcioglu and
               Gabriel Ghinita and
               Elisa Bertino},
  title     = {A Hybrid Approach to Private Record Matching},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {5},
  pages     = {684--698},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.46},
  doi       = {10.1109/TDSC.2012.46},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/InanKGB12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JacksonC12,
  author    = {Jennifer T. Jackson and
               Sadie Creese},
  title     = {Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviors},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {6},
  pages     = {930--943},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.72},
  doi       = {10.1109/TDSC.2012.72},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/JacksonC12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JefferyF12,
  author    = {Casey M. Jeffery and
               Renato J. O. Figueiredo},
  title     = {A Flexible Approach to Improving System Reliability with Virtual Lockstep},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {1},
  pages     = {2--15},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2010.53},
  doi       = {10.1109/TDSC.2010.53},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/JefferyF12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KirkpatrickGB12,
  author    = {Michael S. Kirkpatrick and
               Gabriel Ghinita and
               Elisa Bertino},
  title     = {Resilient Authenticated Execution of Critical Applications in Untrusted
               Environments},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {4},
  pages     = {597--609},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.25},
  doi       = {10.1109/TDSC.2012.25},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KirkpatrickGB12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KirkpatrickGB12a,
  author    = {Michael S. Kirkpatrick and
               Gabriel Ghinita and
               Elisa Bertino},
  title     = {Privacy-Preserving Enforcement of Spatially Aware {RBAC}},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {5},
  pages     = {627--640},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.62},
  doi       = {10.1109/TDSC.2011.62},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KirkpatrickGB12a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LeSK12,
  author    = {Meixing Le and
               Angelos Stavrou and
               Brent ByungHoon Kang},
  title     = {DoubleGuard: Detecting Intrusions in Multitier Web Applications},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {4},
  pages     = {512--525},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.59},
  doi       = {10.1109/TDSC.2011.59},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LeSK12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiLC12,
  author    = {Qiming Li and
               John C. S. Lui and
               Dah{-}Ming Chiu},
  title     = {On the Security and Efficiency of Content Distribution via Network
               Coding},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {2},
  pages     = {211--221},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.32},
  doi       = {10.1109/TDSC.2011.32},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiLC12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LimKW12,
  author    = {Hoon Wei Lim and
               Florian Kerschbaum and
               Huaxiong Wang},
  title     = {Workflow Signatures for Business Process Compliance},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {5},
  pages     = {756--769},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.38},
  doi       = {10.1109/TDSC.2012.38},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LimKW12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LuVAH12,
  author    = {Haibing Lu and
               Jaideep Vaidya and
               Vijayalakshmi Atluri and
               Yuan Hong},
  title     = {Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {5},
  pages     = {655--669},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.21},
  doi       = {10.1109/TDSC.2012.21},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LuVAH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LuoCZC12,
  author    = {Xiapu Luo and
               Edmond W. W. Chan and
               Peng Zhou and
               Rocky K. C. Chang},
  title     = {Robust Network Covert Communications Based on {TCP} and Enumerative
               Combinatorics},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {6},
  pages     = {890--902},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.64},
  doi       = {10.1109/TDSC.2012.64},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LuoCZC12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Martinez-AlvarezCRPGA12,
  author    = {Antonio Mart{\'{\i}}nez{-}{\'{A}}lvarez and
               Sergio Cuenca{-}Asensi and
               Felipe Restrepo{-}Calle and
               Francisco R. Palomo and
               Hip{\'{o}}lito Guzm{\'{a}}n{-}Miranda and
               Miguel A. Aguirre},
  title     = {Compiler-Directed Soft Error Mitigation for Embedded Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {2},
  pages     = {159--172},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.54},
  doi       = {10.1109/TDSC.2011.54},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/Martinez-AlvarezCRPGA12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MasoumzadehJ12,
  author    = {Amirreza Masoumzadeh and
               James Joshi},
  title     = {Preserving Structural Properties in Edge-Perturbing Anonymization
               Techniques for Social Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {6},
  pages     = {877--889},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.65},
  doi       = {10.1109/TDSC.2012.65},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MasoumzadehJ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MeiS12,
  author    = {Alessandro Mei and
               Julinda Stefa},
  title     = {Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish
               Individuals},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {4},
  pages     = {569--582},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.37},
  doi       = {10.1109/TDSC.2012.37},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MeiS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MerentitisKPG12,
  author    = {Andreas Merentitis and
               Nektarios Kranitis and
               Antonis M. Paschalis and
               Dimitris Gizopoulos},
  title     = {Low Energy Online Self-Test of Embedded Processors in Dependable {WSN}
               Nodes},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {1},
  pages     = {86--100},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.17},
  doi       = {10.1109/TDSC.2011.17},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/MerentitisKPG12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MustafaZLXP12,
  author    = {Hossen A. Mustafa and
               Xin Zhang and
               Zhenhua Liu and
               Wenyuan Xu and
               Adrian Perrig},
  title     = {Jamming-Resilient Multipath Routing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {6},
  pages     = {852--864},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.69},
  doi       = {10.1109/TDSC.2012.69},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MustafaZLXP12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NixK12,
  author    = {Robert Nix and
               Murat Kantarcioglu},
  title     = {Incentive Compatible Privacy-Preserving Distributed Classification},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {4},
  pages     = {451--462},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.52},
  doi       = {10.1109/TDSC.2011.52},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/NixK12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PapadopoulosBP12,
  author    = {Stavros Papadopoulos and
               Spiridon Bakiras and
               Dimitris Papadias},
  title     = {pCloud: {A} Distributed System for Practical {PIR}},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {1},
  pages     = {115--127},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2010.60},
  doi       = {10.1109/TDSC.2010.60},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PapadopoulosBP12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PathakR12,
  author    = {Manas A. Pathak and
               Bhiksha Raj},
  title     = {Large Margin Gaussian Mixture Models with Differential Privacy},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {4},
  pages     = {463--469},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.27},
  doi       = {10.1109/TDSC.2012.27},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PathakR12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PerdisciCG12,
  author    = {Roberto Perdisci and
               Igino Corona and
               Giorgio Giacinto},
  title     = {Early Detection of Malicious Flux Networks via Large-Scale Passive
               {DNS} Traffic Analysis},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {5},
  pages     = {714--726},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.35},
  doi       = {10.1109/TDSC.2012.35},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PerdisciCG12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PoolsappasitDR12,
  author    = {Nayot Poolsappasit and
               Rinku Dewri and
               Indrajit Ray},
  title     = {Dynamic Security Risk Management Using Bayesian Attack Graphs},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {1},
  pages     = {61--74},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.34},
  doi       = {10.1109/TDSC.2011.34},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PoolsappasitDR12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ProanoL12,
  author    = {Alejandro Proa{\~{n}}o and
               Loukas Lazos},
  title     = {Packet-Hiding Methods for Preventing Selective Jamming Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {1},
  pages     = {101--114},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.41},
  doi       = {10.1109/TDSC.2011.41},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ProanoL12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Rebollo-MonederoFD12,
  author    = {David Rebollo{-}Monedero and
               Jordi Forn{\'{e}} and
               Josep Domingo{-}Ferrer},
  title     = {Query Profile Obfuscation by Means of Optimal Query Exchange between
               Users},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {5},
  pages     = {641--654},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.16},
  doi       = {10.1109/TDSC.2012.16},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/Rebollo-MonederoFD12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RiboniPB12,
  author    = {Daniele Riboni and
               Linda Pareschi and
               Claudio Bettini},
  title     = {JS-Reduce: Defending Your Data from Sequential Background Knowledge
               Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {3},
  pages     = {387--400},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.19},
  doi       = {10.1109/TDSC.2012.19},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RiboniPB12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RodriguesLCLS12,
  author    = {Rodrigo Rodrigues and
               Barbara Liskov and
               Kathryn Chen and
               Moses D. Liskov and
               David A. Schultz},
  title     = {Automatic Reconfiguration for Large-Scale Reliable Storage Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {2},
  pages     = {145--158},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2010.52},
  doi       = {10.1109/TDSC.2010.52},
  timestamp = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/RodriguesLCLS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RuanYAYQ12,
  author    = {Xiaojun Ruan and
               Qing Yang and
               Mohammed I. Alghamdi and
               Shu Yin and
               Xiao Qin},
  title     = {{ES-MPICH2:} {A} Message Passing Interface with Enhanced Security},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {3},
  pages     = {361--374},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.9},
  doi       = {10.1109/TDSC.2012.9},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/RuanYAYQ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Sandhu12,
  author    = {Ravi S. Sandhu},
  title     = {Editorial},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {1},
  pages     = {1},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.7},
  doi       = {10.1109/TDSC.2012.7},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Sandhu12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Shan0C12,
  author    = {Zhiyong Shan and
               Xin Wang and
               Tzi{-}cker Chiueh},
  title     = {Enforcing Mandatory Access Control in Commodity {OS} to Disable Malware},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {4},
  pages     = {541--555},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.36},
  doi       = {10.1109/TDSC.2012.36},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Shan0C12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShehabM12,
  author    = {Mohamed Shehab and
               Said Marouf},
  title     = {Recommendation Models for Open Authorization},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {4},
  pages     = {583--596},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.34},
  doi       = {10.1109/TDSC.2012.34},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ShehabM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SquicciariniBTB12,
  author    = {Anna Cinzia Squicciarini and
               Elisa Bertino and
               Alberto Trombetta and
               Stefano Braghin},
  title     = {A Flexible Approach to Multisession Trust Negotiations},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {1},
  pages     = {16--29},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.31},
  doi       = {10.1109/TDSC.2011.31},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SquicciariniBTB12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SunLD12,
  author    = {Yan Sun and
               Hong Luo and
               Sajal K. Das},
  title     = {A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless
               Multimedia Sensor Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {6},
  pages     = {785--797},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.68},
  doi       = {10.1109/TDSC.2012.68},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SunLD12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SundareswaranSL12,
  author    = {Smitha Sundareswaran and
               Anna Cinzia Squicciarini and
               Dan Lin},
  title     = {Ensuring Distributed Accountability for Data Sharing in the Cloud},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {4},
  pages     = {556--568},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.26},
  doi       = {10.1109/TDSC.2012.26},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SundareswaranSL12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TangLLP12,
  author    = {Yang Tang and
               Patrick P. C. Lee and
               John C. S. Lui and
               Radia J. Perlman},
  title     = {Secure Overlay Cloud Storage with Access Control and Assured Deletion},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {6},
  pages     = {903--916},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.49},
  doi       = {10.1109/TDSC.2012.49},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/TangLLP12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangZ12,
  author    = {Huaqun Wang and
               Yuqing Zhang},
  title     = {On the Security of a Ticket-Based Anonymity System with Traceability
               Property in Wireless Mesh Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {3},
  pages     = {443--446},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.53},
  doi       = {10.1109/TDSC.2011.53},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangZ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WuXW12,
  author    = {Zhenyu Wu and
               Mengjun Xie and
               Haining Wang},
  title     = {On Energy Security of Server Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {6},
  pages     = {865--876},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.70},
  doi       = {10.1109/TDSC.2012.70},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WuXW12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuLZ12,
  author    = {Shouhuai Xu and
               Wenlian Lu and
               Zhenxin Zhan},
  title     = {A Stochastic Model of Multivirus Dynamics},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {1},
  pages     = {30--45},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.33},
  doi       = {10.1109/TDSC.2011.33},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/XuLZ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuTSTWX12,
  author    = {Dianxiang Xu and
               Manghui Tu and
               Michael Sanford and
               Lijo Thomas and
               Daniel Woodraska and
               Weifeng Xu},
  title     = {Automated Security Test Generation with Formal Threat Models},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {4},
  pages     = {526--540},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.24},
  doi       = {10.1109/TDSC.2012.24},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/XuTSTWX12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuXWSY12,
  author    = {Kui Xu and
               Huijun Xiong and
               Chehai Wu and
               Deian Stefan and
               Danfeng Yao},
  title     = {Data-Provenance Verification For Secure Hosts},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {2},
  pages     = {173--183},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.50},
  doi       = {10.1109/TDSC.2011.50},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/XuXWSY12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuZHAS12,
  author    = {Wenjuan Xu and
               Xinwen Zhang and
               Hongxin Hu and
               Gail{-}Joon Ahn and
               Jean{-}Pierre Seifert},
  title     = {Remote Attestation with Domain-Based Integrity Model and Policy Analysis},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {3},
  pages     = {429--442},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.61},
  doi       = {10.1109/TDSC.2011.61},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/XuZHAS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Yi12,
  author    = {Xun Yi},
  title     = {Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management
               Scheme for Secure Broadcasting},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {2},
  pages     = {303--304},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2010.42},
  doi       = {10.1109/TDSC.2010.42},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Yi12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhanSD12,
  author    = {Guoxing Zhan and
               Weisong Shi and
               Hongmei Julia Deng},
  title     = {Design and Implementation of {TARF:} {A} Trust-Aware Routing Framework
               for WSNs},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {2},
  pages     = {184--197},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.58},
  doi       = {10.1109/TDSC.2011.58},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhanSD12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhaoHAW12,
  author    = {Ziming Zhao and
               Hongxin Hu and
               Gail{-}Joon Ahn and
               Ruoyu Wu},
  title     = {Risk-Aware Mitigation for {MANET} Routing Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {2},
  pages     = {250--260},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.51},
  doi       = {10.1109/TDSC.2011.51},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhaoHAW12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhuLV12,
  author    = {Ye Zhu and
               Yuanchao Lu and
               Anil Vikram},
  title     = {On Privacy of Encrypted Speech Communications},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {4},
  pages     = {470--481},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.56},
  doi       = {10.1109/TDSC.2011.56},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhuLV12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Zuo12,
  author    = {Yanjun Zuo},
  title     = {Survivability Experiment and Attack Characterization for {RFID}},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {9},
  number    = {2},
  pages     = {289--302},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.30},
  doi       = {10.1109/TDSC.2011.30},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Zuo12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AliotoPR10,
  author    = {Massimo Alioto and
               Massimo Poli and
               Santina Rocchi},
  title     = {Differential Power Analysis Attacks to Precharged Buses: {A} General
               Analysis for Symmetric-Key Cryptographic Algorithms},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {3},
  pages     = {226--239},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2009.1},
  doi       = {10.1109/TDSC.2009.1},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AliotoPR10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AmirDDKLNOZ10,
  author    = {Yair Amir and
               Claudiu Danilov and
               Danny Dolev and
               Jonathan Kirsch and
               John Lane and
               Cristina Nita{-}Rotaru and
               Josh Olsen and
               David Zage},
  title     = {Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area
               Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {1},
  pages     = {80--93},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2008.53},
  doi       = {10.1109/TDSC.2008.53},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AmirDDKLNOZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BernardiPGR10,
  author    = {Paolo Bernardi and
               Let{\'{\i}}cia Maria Veiras Bolzani Poehls and
               Michelangelo Grosso and
               Matteo Sonza Reorda},
  title     = {A Hybrid Approach for Detection and Correction of Transient Faults
               in SoCs},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {4},
  pages     = {439--445},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2010.33},
  doi       = {10.1109/TDSC.2010.33},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BernardiPGR10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BoudaliCS10,
  author    = {Hichem Boudali and
               Pepijn Crouzen and
               Mari{\"{e}}lle Stoelinga},
  title     = {A Rigorous, Compositional, and Extensible Framework for Dynamic Fault
               Tree Analysis},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {2},
  pages     = {128--143},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2009.45},
  doi       = {10.1109/TDSC.2009.45},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BoudaliCS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BoydKLKP10,
  author    = {Stephen W. Boyd and
               Gaurav S. Kc and
               Michael E. Locasto and
               Angelos D. Keromytis and
               Vassilis Prevelakis},
  title     = {On the General Applicability of Instruction-Set Randomization},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {3},
  pages     = {255--270},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2008.58},
  doi       = {10.1109/TDSC.2008.58},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BoydKLKP10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Fallah10,
  author    = {Mehran S. Fallah},
  title     = {A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game
               Theory},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {1},
  pages     = {5--19},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2008.13},
  doi       = {10.1109/TDSC.2008.13},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Fallah10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GaoDZAI10,
  author    = {Lei Gao and
               Michael Dahlin and
               Jiandan Zheng and
               Lorenzo Alvisi and
               Arun Iyengar},
  title     = {Dual-Quorum: {A} Highly Available and Consistent Replication System
               for Edge Services},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {2},
  pages     = {159--174},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2008.36},
  doi       = {10.1109/TDSC.2008.36},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/GaoDZAI10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GaonkarKMS10,
  author    = {Shravan Gaonkar and
               Kimberly Keeton and
               Arif Merchant and
               William H. Sanders},
  title     = {Designing Dependable Storage Solutions for Shared Application Environments},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {4},
  pages     = {366--380},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2008.38},
  doi       = {10.1109/TDSC.2008.38},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/GaonkarKMS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Gligor10,
  author    = {Virgil D. Gligor},
  title     = {Editorial},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {1},
  pages     = {1--3},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2010.9},
  doi       = {10.1109/TDSC.2010.9},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Gligor10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuptaNR10,
  author    = {Kapil Kumar Gupta and
               Baikunth Nath and
               Kotagiri Ramamohanarao},
  title     = {Layered Approach Using Conditional Random Fields for Intrusion Detection},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {1},
  pages     = {35--49},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2008.20},
  doi       = {10.1109/TDSC.2008.20},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/GuptaNR10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HanQ10,
  author    = {Mi Kyung Han and
               Lili Qiu},
  title     = {Greedy Receivers in {IEEE} 802.11 Hotspots: Impacts and Detection},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {4},
  pages     = {410--423},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2010.2},
  doi       = {10.1109/TDSC.2010.2},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HanQ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KinderKSV10,
  author    = {Johannes Kinder and
               Stefan Katzenbeisser and
               Christian Schallhart and
               Helmut Veith},
  title     = {Proactive Detection of Computer Worms Using Model Checking},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {4},
  pages     = {424--438},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2008.74},
  doi       = {10.1109/TDSC.2008.74},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KinderKSV10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KompellaYGS10,
  author    = {Ramana Rao Kompella and
               Jennifer Yates and
               Albert G. Greenberg and
               Alex C. Snoeren},
  title     = {Fault Localization via Risk Modeling},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {4},
  pages     = {396--409},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2009.37},
  doi       = {10.1109/TDSC.2009.37},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KompellaYGS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KongJCCH10,
  author    = {Joonho Kong and
               Johnsy K. John and
               Eui{-}Young Chung and
               Sung Woo Chung and
               Jie S. Hu},
  title     = {On the Thermal Attack in Instruction Caches},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {2},
  pages     = {217--223},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2009.16},
  doi       = {10.1109/TDSC.2009.16},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KongJCCH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaHA10,
  author    = {Tiejun Ma and
               Jane Hillston and
               Stuart Anderson},
  title     = {On the Quality of Service of Crash-Recovery Failure Detectors},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {3},
  pages     = {271--283},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2009.35},
  doi       = {10.1109/TDSC.2009.35},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MaHA10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaggiMZ10,
  author    = {Federico Maggi and
               Matteo Matteucci and
               Stefano Zanero},
  title     = {Detecting Intrusions through System Call Sequence and Argument Analysis},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {4},
  pages     = {381--395},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2008.69},
  doi       = {10.1109/TDSC.2008.69},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MaggiMZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MasoodGM10,
  author    = {Ammar Masood and
               Arif Ghafoor and
               Aditya P. Mathur},
  title     = {Conformance Testing of Temporal Role-Based Access Control Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {2},
  pages     = {144--158},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2008.41},
  doi       = {10.1109/TDSC.2008.41},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MasoodGM10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MittalN10,
  author    = {Neeraj Mittal and
               Ramon Novales},
  title     = {Cluster-Based Key Predistribution Using Deployment Knowledge},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {3},
  pages     = {329--335},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2009.34},
  doi       = {10.1109/TDSC.2009.34},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MittalN10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NicopoulosSYPNDI10,
  author    = {Chrysostomos Nicopoulos and
               Suresh Srinivasan and
               Aditya Yanamandra and
               Dongkook Park and
               Vijaykrishnan Narayanan and
               Chita R. Das and
               Mary Jane Irwin},
  title     = {On the Effects of Process Variation in Network-on-Chip Architectures},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {3},
  pages     = {240--254},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2008.59},
  doi       = {10.1109/TDSC.2008.59},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/NicopoulosSYPNDI10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PeterWC10,
  author    = {Steffen Peter and
               Dirk Westhoff and
               Claude Castelluccia},
  title     = {A Survey on the Encryption of Convergecast Traffic with In-Network
               Processing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {1},
  pages     = {20--34},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2008.23},
  doi       = {10.1109/TDSC.2008.23},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PeterWC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Redinbo10,
  author    = {G. Robert Redinbo},
  title     = {Wavelet Codes for Algorithm-Based Fault Tolerance Applications},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {3},
  pages     = {315--328},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2009.14},
  doi       = {10.1109/TDSC.2009.14},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Redinbo10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RileyJX10,
  author    = {Ryan Riley and
               Xuxian Jiang and
               Dongyan Xu},
  title     = {An Architectural Approach to Preventing Code Injection Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {4},
  pages     = {351--365},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2010.1},
  doi       = {10.1109/TDSC.2010.1},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RileyJX10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Sandhu10,
  author    = {Ravi S. Sandhu},
  title     = {Editorial},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {1},
  pages     = {4},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2010.8},
  doi       = {10.1109/TDSC.2010.8},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Sandhu10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Sandhu10a,
  author    = {Ravi S. Sandhu},
  title     = {Editorial},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {3},
  pages     = {225},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2010.32},
  doi       = {10.1109/TDSC.2010.32},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Sandhu10a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SchroederG10,
  author    = {Bianca Schroeder and
               Garth A. Gibson},
  title     = {A Large-Scale Study of Failures in High-Performance Computing Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {4},
  pages     = {337--351},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2009.4},
  doi       = {10.1109/TDSC.2009.4},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SchroederG10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SheuHL10,
  author    = {Tzu{-}Fang Sheu and
               Nen{-}Fu Huang and
               Hsiao Ping Lee},
  title     = {In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {2},
  pages     = {175--188},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2008.57},
  doi       = {10.1109/TDSC.2008.57},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SheuHL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TimorMBS10,
  author    = {Avi Timor and
               Avi Mendelson and
               Yitzhak Birk and
               Neeraj Suri},
  title     = {Using Underutilized {CPU} Resources to Enhance Its Reliability},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {1},
  pages     = {94--109},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2008.31},
  doi       = {10.1109/TDSC.2008.31},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/TimorMBS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TuLYTK10,
  author    = {Manghui Tu and
               Peng Li and
               I{-}Ling Yen and
               Bhavani M. Thuraisingham and
               Latifur Khan},
  title     = {Secure Data Objects Replication in Data Grid},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {1},
  pages     = {50--64},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2008.19},
  doi       = {10.1109/TDSC.2008.19},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/TuLYTK10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VaidyaAWG10,
  author    = {Jaideep Vaidya and
               Vijayalakshmi Atluri and
               Janice Warner and
               Qi Guo},
  title     = {Role Engineering via Prioritized Subset Enumeration},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {3},
  pages     = {300--314},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2008.61},
  doi       = {10.1109/TDSC.2008.61},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/VaidyaAWG10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangPLZ10,
  author    = {Xinran Wang and
               Chi{-}Chun Pan and
               Peng Liu and
               Sencun Zhu},
  title     = {SigFree: {A} Signature-Free Buffer Overflow Attack Blocker},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {1},
  pages     = {65--79},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2008.30},
  doi       = {10.1109/TDSC.2008.30},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangPLZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangR10,
  author    = {XiaoFeng Wang and
               Michael K. Reiter},
  title     = {Using Web-Referral Architectures to Mitigate Denial-of-Service Threats},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {2},
  pages     = {203--216},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2008.56},
  doi       = {10.1109/TDSC.2008.56},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangR10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangSZ10,
  author    = {Ping Wang and
               Sherri Sparks and
               Cliff Changchun Zou},
  title     = {An Advanced Hybrid Peer-to-Peer Botnet},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {2},
  pages     = {113--127},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2008.35},
  doi       = {10.1109/TDSC.2008.35},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangSZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XingW10,
  author    = {Fei Xing and
               Wenye Wang},
  title     = {On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors
               and Failures},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {3},
  pages     = {284--299},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2008.71},
  doi       = {10.1109/TDSC.2008.71},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/XingW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YangLDB10,
  author    = {Yanjiang Yang and
               Yingjiu Li and
               Robert H. Deng and
               Feng Bao},
  title     = {Shifting Inference Control to User Side: Architecture and Protocol},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {2},
  pages     = {189--202},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2008.70},
  doi       = {10.1109/TDSC.2008.70},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/YangLDB10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CaoBL09,
  author    = {Tianjie Cao and
               Elisa Bertino and
               Hong Lei},
  title     = {Security Analysis of the {SASI} Protocol},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {1},
  pages     = {73--77},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2008.32},
  doi       = {10.1109/TDSC.2008.32},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CaoBL09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CarbunarIN09,
  author    = {Bogdan Carbunar and
               Ioannis Ioannidis and
               Cristina Nita{-}Rotaru},
  title     = {{JANUS:} {A} Framework for Scalable and Secure Routing in Hybrid Wireless
               Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {4},
  pages     = {295--308},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2008.14},
  doi       = {10.1109/TDSC.2008.14},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CarbunarIN09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DistefanoP09,
  author    = {Salvatore Distefano and
               Antonio Puliafito},
  title     = {Dependability Evaluation with Dynamic Reliability Block Diagrams and
               Dynamic Fault Trees},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {1},
  pages     = {4--17},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2007.70242},
  doi       = {10.1109/TDSC.2007.70242},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/DistefanoP09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Dominguez-OviedoH09,
  author    = {Agustin Dominguez{-}Oviedo and
               M. Anwar Hasan},
  title     = {Error Detection and Fault Tolerance in {ECSM} Using Input Randomization},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {3},
  pages     = {175--187},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2008.21},
  doi       = {10.1109/TDSC.2008.21},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Dominguez-OviedoH09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ErginUVG09,
  author    = {Oguz Ergin and
               Osman S. Unsal and
               Xavier Vera and
               Antonio Gonz{\'{a}}lez},
  title     = {Reducing Soft Errors through Operand Width Aware Policies},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {3},
  pages     = {217--230},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2008.18},
  doi       = {10.1109/TDSC.2008.18},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ErginUVG09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GaoRS09,
  author    = {Debin Gao and
               Michael K. Reiter and
               Dawn Xiaodong Song},
  title     = {Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based
               Behavioral Distance},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {2},
  pages     = {96--110},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2008.39},
  doi       = {10.1109/TDSC.2008.39},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/GaoRS09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GiraultK09,
  author    = {Alain Girault and
               Hamoudi Kalla},
  title     = {A Novel Bicriteria Scheduling Heuristics Providing a Guaranteed Global
               System Failure Rate},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {4},
  pages     = {241--254},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2008.50},
  doi       = {10.1109/TDSC.2008.50},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/GiraultK09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Gizopoulos09,
  author    = {Dimitris Gizopoulos},
  title     = {Online Periodic Self-Test Scheduling for Real-Time Processor-Based
               Systems Dependability Enhancement},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {2},
  pages     = {152--158},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2009.12},
  doi       = {10.1109/TDSC.2009.12},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Gizopoulos09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuLLC09,
  author    = {Qijun Gu and
               Peng Liu and
               Wang{-}Chien Lee and
               Chao{-}Hsien Chu},
  title     = {{KTR:} An Efficient Key Management Scheme for Secure Data Access Control
               in Wireless Broadcast Services},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {3},
  pages     = {188--201},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2008.12},
  doi       = {10.1109/TDSC.2008.12},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/GuLLC09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HutleMSZ09,
  author    = {Martin Hutle and
               Dahlia Malkhi and
               Ulrich Schmid and
               Lidong Zhou},
  title     = {Chasing the Weakest System Model for Implementing {\(\Omega\)} and
               Consensus},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {4},
  pages     = {269--281},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2008.24},
  doi       = {10.1109/TDSC.2008.24},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HutleMSZ09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JafarKG09,
  author    = {Samir Jafar and
               Axel W. Krings and
               Thierry Gautier},
  title     = {Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {1},
  pages     = {32--44},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2008.17},
  doi       = {10.1109/TDSC.2008.17},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/JafarKG09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KunduPSM09,
  author    = {Amlan Kundu and
               Suvasini Panigrahi and
               Shamik Sural and
               Arun K. Majumdar},
  title     = {{BLAST-SSAHA} Hybridization for Credit Card Fraud Detection},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {4},
  pages     = {309--315},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2009.11},
  doi       = {10.1109/TDSC.2009.11},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KunduPSM09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaxinoK09,
  author    = {T. C. Maxino and
               P. J. Koopman},
  title     = {The Effectiveness of Checksums for Embedded Control Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {1},
  pages     = {59--72},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2007.70216},
  doi       = {10.1109/TDSC.2007.70216},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MaxinoK09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MeixnerS09,
  author    = {Albert Meixner and
               Daniel J. Sorin},
  title     = {Dynamic Verification of Memory Consistency in Cache-Coherent Multithreaded
               Computer Architectures},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {1},
  pages     = {18--31},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2007.70243},
  doi       = {10.1109/TDSC.2007.70243},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MeixnerS09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MichailKMG09,
  author    = {Harris E. Michail and
               Athanasios Kakarountas and
               Athanasios Milidonis and
               Costas E. Goutis},
  title     = {A Top-Down Design Methodology for Ultrahigh-Performance Hashing Cores},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {4},
  pages     = {255--268},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2008.15},
  doi       = {10.1109/TDSC.2008.15},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MichailKMG09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MirkovicHFRT09,
  author    = {Jelena Mirkovic and
               Alefiya Hussain and
               Sonia Fahmy and
               Peter L. Reiher and
               Roshan K. Thomas},
  title     = {Accurately Measuring Denial of Service in Simulation and Testbed Experiments},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {2},
  pages     = {81--95},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2008.73},
  doi       = {10.1109/TDSC.2008.73},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MirkovicHFRT09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Phan09,
  author    = {Raphael C.{-}W. Phan},
  title     = {Cryptanalysis of a New Ultralightweight {RFID} Authentication Protocol{\textemdash}SASI},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {4},
  pages     = {316--320},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2008.33},
  doi       = {10.1109/TDSC.2008.33},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Phan09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PomeranzR09,
  author    = {Irith Pomeranz and
               Sudhakar M. Reddy},
  title     = {Semiconcurrent Online Testing of Transition Faults through Output
               Response Comparison of Identical Circuits},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {3},
  pages     = {231--240},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2008.34},
  doi       = {10.1109/TDSC.2008.34},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PomeranzR09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RahbaranS09,
  author    = {Babak Rahbaran and
               Andreas Steininger},
  title     = {Is Asynchronous Logic More Robust Than Synchronous Logic?},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {4},
  pages     = {282--294},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2008.37},
  doi       = {10.1109/TDSC.2008.37},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RahbaranS09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RamanarayananDRKNXIU09,
  author    = {Rajaraman Ramanarayanan and
               Vijay Degalahal and
               Krishnan Ramakrishnan and
               Jungsub Kim and
               Vijaykrishnan Narayanan and
               Yuan Xie and
               Mary Jane Irwin and
               Kenan Unlu},
  title     = {Modeling Soft Errors at the Device and Logic Levels for Combinational
               Circuits},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {3},
  pages     = {202--216},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2007.70231},
  doi       = {10.1109/TDSC.2007.70231},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RamanarayananDRKNXIU09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SaidaneND09,
  author    = {Ayda Sa{\"{\i}}dane and
               Vincent Nicomette and
               Yves Deswarte},
  title     = {The Design of a Generic Intrusion-Tolerant Architecture for Web Servers},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {1},
  pages     = {45--58},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2008.1},
  doi       = {10.1109/TDSC.2008.1},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SaidaneND09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShyeBMRC09,
  author    = {Alex Shye and
               Joseph Blomstedt and
               Tipp Moseley and
               Vijay Janapa Reddi and
               Daniel A. Connors},
  title     = {{PLR:} {A} Software Approach to Transient Fault Tolerance for Multicore
               Architectures},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {2},
  pages     = {135--148},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2008.62},
  doi       = {10.1109/TDSC.2008.62},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ShyeBMRC09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SunWC09,
  author    = {Hung{-}Min Sun and
               King{-}Hang Wang and
               Chien{-}Ming Chen},
  title     = {On the Security of an Efficient Time-Bound Hierarchical Key Management
               Scheme},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {2},
  pages     = {159--160},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2009.15},
  doi       = {10.1109/TDSC.2009.15},
  timestamp = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SunWC09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TagueSRP09,
  author    = {Patrick Tague and
               David Slater and
               Jason Rogers and
               Radha Poovendran},
  title     = {Evaluating the Vulnerability of Network Traffic Using Joint Security
               and Routing Analysis},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {2},
  pages     = {111--123},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2008.60},
  doi       = {10.1109/TDSC.2008.60},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/TagueSRP09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangZS09,
  author    = {Huaqun Wang and
               Futai Zhang and
               Yanfei Sun},
  title     = {Cryptanalysis of a Generalized Ring Signature Scheme},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {2},
  pages     = {149--151},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2009.13},
  doi       = {10.1109/TDSC.2009.13},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangZS09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XenoulisGPP09,
  author    = {George Xenoulis and
               Dimitris Gizopoulos and
               Mihalis Psarakis and
               Antonis M. Paschalis},
  title     = {Instruction-Based Online Periodic Self-Testing of Microprocessors
               with Floating-Point Units},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {2},
  pages     = {124--134},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2008.68},
  doi       = {10.1109/TDSC.2008.68},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/XenoulisGPP09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XingD09,
  author    = {Liudong Xing and
               Yuanshun Dai},
  title     = {A New Decision-Diagram-Based Method for Efficient Analysis on Multistate
               Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {6},
  number    = {3},
  pages     = {161--174},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2007.70244},
  doi       = {10.1109/TDSC.2007.70244},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/XingD09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BertinoSW08,
  author    = {Elisa Bertino and
               Ning Shang and
               Samuel S. Wagstaff Jr.},
  title     = {An Efficient Time-Bound Hierarchical Key Management Scheme for Secure
               Broadcasting},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {5},
  number    = {2},
  pages     = {65--70},
  year      = {2008},
  url       = {https://doi.org/10.1109/TDSC.2007.70241},
  doi       = {10.1109/TDSC.2007.70241},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BertinoSW08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Blanchet08,
  author    = {Bruno Blanchet},
  title     = {A Computationally Sound Mechanized Prover for Security Protocols},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {5},
  number    = {4},
  pages     = {193--207},
  year      = {2008},
  url       = {https://doi.org/10.1109/TDSC.2007.1005},
  doi       = {10.1109/TDSC.2007.1005},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Blanchet08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BrumleyNSWJ08,
  author    = {David Brumley and
               James Newsome and
               Dawn Song and
               Hao Wang and
               Somesh Jha},
  title     = {Theory and Techniques for Automatic Generation of Vulnerability-Based
               Signatures},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {5},
  number    = {4},
  pages     = {224--241},
  year      = {2008},
  url       = {https://doi.org/10.1109/TDSC.2008.55},
  doi       = {10.1109/TDSC.2008.55},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BrumleyNSWJ08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CapkunCRTHS08,
  author    = {Srdjan Capkun and
               Mario Cagalj and
               Ram Kumar Rengaswamy and
               Ilias Tsigkogiannis and
               Jean{-}Pierre Hubaux and
               Mani B. Srivastava},
  title     = {Integrity Codes: Message Integrity Protection and Authentication over
               Insecure Channels},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {5},
  number    = {4},
  pages     = {208--223},
  year      = {2008},
  url       = {https://doi.org/10.1109/TDSC.2008.11},
  doi       = {10.1109/TDSC.2008.11},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CapkunCRTHS08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DengH08,
  author    = {Jing Deng and
               Yunghsiang S. Han},
  title     = {Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough
               Redundancy Transmission},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {5},
  number    = {3},
  pages     = {177--190},
  year      = {2008},
  url       = {https://doi.org/10.1109/TDSC.2007.70233},
  doi       = {10.1109/TDSC.2007.70233},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/DengH08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DuanYC08,
  author    = {Zhenhai Duan and
               Xin Yuan and
               Jaideep Chandrashekar},
  title     = {Controlling {IP} Spoofing through Interdomain Packet Filters},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {5},
  number    = {1},
  pages     = {22--36},
  year      = {2008},
  url       = {https://doi.org/10.1109/TDSC.2007.70224},
  doi       = {10.1109/TDSC.2007.70224},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/DuanYC08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HalkidisTCS08,
  author    = {Spyros T. Halkidis and
               Nikolaos Tsantalis and
               Alexander Chatzigeorgiou and
               George Stephanides},
  title     = {Architectural Risk Analysis of Software Systems Based on Security
               Patterns},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {5},
  number    = {3},
  pages     = {129--142},
  year      = {2008},
  url       = {https://doi.org/10.1109/TDSC.2007.70240},
  doi       = {10.1109/TDSC.2007.70240},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HalkidisTCS08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JhaLTWW08,
  author    = {Somesh Jha and
               Ninghui Li and
               Mahesh V. Tripunitara and
               Qihua Wang and
               William H. Winsborough},
  title     = {Towards Formal Verification of Role-Based Access Control Policies},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {5},
  number    = {4},
  pages     = {242--255},
  year      = {2008},
  url       = {https://doi.org/10.1109/TDSC.2007.70225},
  doi       = {10.1109/TDSC.2007.70225},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/JhaLTWW08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LuL08,
  author    = {Haibing Lu and
               Yingjiu Li},
  title     = {Practical Inference Control for Data Cubes},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {5},
  number    = {2},
  pages     = {87--98},
  year      = {2008},
  url       = {https://doi.org/10.1109/TDSC.2007.70217},
  doi       = {10.1109/TDSC.2007.70217},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LuL08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MenichelliMOT08,
  author    = {Francesco Menichelli and
               Renato Menicocci and
               Mauro Olivieri and
               Alessandro Trifiletti},
  title     = {High-Level Side-Channel Attack Modeling and Simulation for Security-Critical
               Systems on Chips},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {5},
  number    = {3},
  pages     = {164--176},
  year      = {2008},
  url       = {https://doi.org/10.1109/TDSC.2007.70234},
  doi       = {10.1109/TDSC.2007.70234},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MenichelliMOT08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Obermaisser08,
  author    = {Roman Obermaisser},
  title     = {Temporal Partitioning of Communication Resources in an Integrated
               Architecture},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {5},
  number    = {2},
  pages     = {99--114},
  year      = {2008},
  url       = {https://doi.org/10.1109/TDSC.2007.70232},
  doi       = {10.1109/TDSC.2007.70232},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Obermaisser08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ParkNL08,
  author    = {Jong{-}Tae Park and
               Jae{-}Wook Nah and
               Wee{-}Hyuk Lee},
  title     = {Dynamic Path Management with Resilience Constraints under Multiple
               Link Failures in {MPLS/GMPLS} Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {5},
  number    = {3},
  pages     = {143--154},
  year      = {2008},
  url       = {https://doi.org/10.1109/TDSC.2008.16},
  doi       = {10.1109/TDSC.2008.16},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ParkNL08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Ramkumar08,
  author    = {Mahalingam Ramkumar},
  title     = {Trustworthy Computing under Resource Constraints with the {DOWN} Policy},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {5},
  number    = {1},
  pages     = {49--61},
  year      = {2008},
  url       = {https://doi.org/10.1109/TDSC.2007.70227},
  doi       = {10.1109/TDSC.2007.70227},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Ramkumar08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RenH08,
  author    = {Jian Ren and
               Lein Harn},
  title     = {Generalized Ring Signatures},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {5},
  number    = {3},
  pages     = {155--163},
  year      = {2008},
  url       = {https://doi.org/10.1109/TDSC.2008.22},
  doi       = {10.1109/TDSC.2008.22},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RenH08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SellkeSB08,
  author    = {Sarah H. Sellke and
               Ness B. Shroff and
               Saurabh Bagchi},
  title     = {Modeling and Automated Containment of Worms},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {5},
  number    = {2},
  pages     = {71--86},
  year      = {2008},
  url       = {https://doi.org/10.1109/TDSC.2007.70230},
  doi       = {10.1109/TDSC.2007.70230},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SellkeSB08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SrinivasanKMXNIS08,
  author    = {Suresh Srinivasan and
               Krishnan Ramakrishnan and
               Prasanth Mangalagiri and
               Yuan Xie and
               Vijaykrishnan Narayanan and
               Mary Jane Irwin and
               Karthik Sarpatwari},
  title     = {Toward Increasing {FPGA} Lifetime},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {5},
  number    = {2},
  pages     = {115--127},
  year      = {2008},
  url       = {https://doi.org/10.1109/TDSC.2007.70235},
  doi       = {10.1109/TDSC.2007.70235},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SrinivasanKMXNIS08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SrivastavaKSM08,
  author    = {Abhinav Srivastava and
               Amlan Kundu and
               Shamik Sural and
               Arun K. Majumdar},
  title     = {Credit Card Fraud Detection Using Hidden Markov Model},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {5},
  number    = {1},
  pages     = {37--48},
  year      = {2008},
  url       = {https://doi.org/10.1109/TDSC.2007.70228},
  doi       = {10.1109/TDSC.2007.70228},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SrivastavaKSM08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WongWL08,
  author    = {T. Y. Wong and
               Man Hon Wong and
               John C. S. Lui},
  title     = {A Precise Termination Condition of the Probabilistic Packet Marking
               Algorithm},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {5},
  number    = {1},
  pages     = {6--21},
  year      = {2008},
  url       = {https://doi.org/10.1109/TDSC.2007.70229},
  doi       = {10.1109/TDSC.2007.70229},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WongWL08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AhmedT07,
  author    = {Ahmed Awad E. Ahmed and
               Issa Traor{\'{e}}},
  title     = {A New Biometric Technology Based on Mouse Dynamics},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {3},
  pages     = {165--179},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.70207},
  doi       = {10.1109/TDSC.2007.70207},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AhmedT07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AwerbuchKMPV07,
  author    = {Baruch Awerbuch and
               Shay Kutten and
               Yishay Mansour and
               Boaz Patt{-}Shamir and
               George Varghese},
  title     = {A Time-Optimal Self-Stabilizing Synchronizer Using {A} Phase Clock},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {3},
  pages     = {180--190},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.1007},
  doi       = {10.1109/TDSC.2007.1007},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AwerbuchKMPV07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BadishiHK07,
  author    = {Gal Badishi and
               Amir Herzberg and
               Idit Keidar},
  title     = {Keeping Denial-of-Service Attackers in the Dark},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {3},
  pages     = {191--204},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.70209},
  doi       = {10.1109/TDSC.2007.70209},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BadishiHK07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BouabdallahS07,
  author    = {Nizar Bouabdallah and
               Bruno Sericola},
  title     = {Introducing a Relative Priority for the Shared-Protection Schemes},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {3},
  pages     = {205--215},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.1008},
  doi       = {10.1109/TDSC.2007.1008},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BouabdallahS07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BucciGLT07,
  author    = {Marco Bucci and
               Luca Giancane and
               Raimondo Luzzi and
               Alessandro Trifiletti},
  title     = {A Dynamic and Differential {CMOS} Lookup Table with Data-Independent
               Power Consumption for Cryptographic Applications on Chip Cards},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {4},
  pages     = {245--251},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.70212},
  doi       = {10.1109/TDSC.2007.70212},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BucciGLT07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CaiHPP07,
  author    = {Min Cai and
               Kai Hwang and
               Jianping Pan and
               Christos Papadopoulos},
  title     = {WormShield: Fast Worm Signature Generation with Distributed Fingerprint
               Aggregation},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {2},
  pages     = {88--104},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.1000},
  doi       = {10.1109/TDSC.2007.1000},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CaiHPP07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CervesatoM07,
  author    = {Iliano Cervesato and
               Catherine A. Meadows},
  title     = {One Picture Is Worth a Dozen Connectives: {A} Fault-Tree Representation
               of {NPATRL} Security Requirements},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {3},
  pages     = {216--227},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.70206},
  doi       = {10.1109/TDSC.2007.70206},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CervesatoM07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Chien07,
  author    = {Hung{-}Yu Chien},
  title     = {{SASI:} {A} New Ultralightweight {RFID} Authentication Protocol Providing
               Strong Authentication and Strong Integrity},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {4},
  pages     = {337--340},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.70226},
  doi       = {10.1109/TDSC.2007.70226},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Chien07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DantuCP07,
  author    = {Ram Dantu and
               Jo{\~{a}}o W. Cangussu and
               Sudeep Patwardhan},
  title     = {Fast Worm Containment Using Feedback Control},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {2},
  pages     = {119--136},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.1002},
  doi       = {10.1109/TDSC.2007.1002},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/DantuCP07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GashiPS07,
  author    = {Ilir Gashi and
               Peter T. Popov and
               Lorenzo Strigini},
  title     = {Fault Tolerance via Diversity for Off-the-Shelf Products: {A} Study
               with {SQL} Database Servers},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {4},
  pages     = {280--294},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.70208},
  doi       = {10.1109/TDSC.2007.70208},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/GashiPS07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Gokhale07,
  author    = {Swapna S. Gokhale},
  title     = {Architecture-Based Software Reliability Analysis: Overview and Limitations},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {1},
  pages     = {32--40},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.4},
  doi       = {10.1109/TDSC.2007.4},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Gokhale07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GorenderMR07,
  author    = {S{\'{e}}rgio Gorender and
               Raimundo Jos{\'{e}} de Ara{\'{u}}jo Mac{\^{e}}do and
               Michel Raynal},
  title     = {An Adaptive Programming Model for Fault-Tolerant Distributed Computing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {1},
  pages     = {18--31},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.3},
  doi       = {10.1109/TDSC.2007.3},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/GorenderMR07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HaleemMCS07,
  author    = {Mohamed A. Haleem and
               Chetan Nanjunda Mathur and
               Rajarathnam Chandramouli and
               K. P. Subbalakshmi},
  title     = {Opportunistic Encryption: {A} Trade-Off between Security and Throughput
               in Wireless Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {4},
  pages     = {313--324},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.70214},
  doi       = {10.1109/TDSC.2007.70214},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HaleemMCS07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HwangCCQ07,
  author    = {Kai Hwang and
               Min Cai and
               Ying Chen and
               Min Qin},
  title     = {Hybrid Intrusion Detection with Weighted Signature Generation over
               Anomalous Internet Episodes},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {1},
  pages     = {41--55},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.9},
  doi       = {10.1109/TDSC.2007.9},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HwangCCQ07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HwangLL07,
  author    = {Tzonelih Hwang and
               Kuo{-}Chang Lee and
               Chuan{-}Ming Li},
  title     = {Provably Secure Three-Party Authenticated Quantum Key Distribution
               Protocols},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {1},
  pages     = {71--80},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.13},
  doi       = {10.1109/TDSC.2007.13},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HwangLL07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Iyer07,
  author    = {Ravishankar K. Iyer},
  title     = {Editorial: Dependability and Security},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {2},
  pages     = {85--87},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.070201},
  doi       = {10.1109/TDSC.2007.070201},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Iyer07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KhannaCVBCV07,
  author    = {Gunjan Khanna and
               Mike Yu Cheng and
               Padma Varadharajan and
               Saurabh Bagchi and
               Miguel P. Correia and
               Paulo Ver{\'{\i}}ssimo},
  title     = {Automated Rule-Based Diagnosis through a Distributed Monitor System},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {4},
  pages     = {266--279},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.70211},
  doi       = {10.1109/TDSC.2007.70211},
  timestamp = {Tue, 06 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KhannaCVBCV07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LeeTPP07,
  author    = {Jeremy Lee and
               Mohammad Tehranipoor and
               Chintan Patel and
               Jim Plusquellic},
  title     = {Securing Designs against Scan-Based Side-Channel Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {4},
  pages     = {325--336},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.70215},
  doi       = {10.1109/TDSC.2007.70215},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LeeTPP07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PeisertBKM07,
  author    = {Sean Peisert and
               Matt Bishop and
               Sidney Karin and
               Keith Marzullo},
  title     = {Analysis of Computer Intrusions Using Sequences of Function Calls},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {2},
  pages     = {137--150},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.1003},
  doi       = {10.1109/TDSC.2007.1003},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PeisertBKM07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RamasamyAS07,
  author    = {HariGovind V. Ramasamy and
               Adnan Agbaria and
               William H. Sanders},
  title     = {A Parsimonious Approach for Obtaining Resource-Efficient and Trustworthy
               Execution},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {1},
  pages     = {1--17},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.2},
  doi       = {10.1109/TDSC.2007.2},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RamasamyAS07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ReayBDM07,
  author    = {Ian Reay and
               Patricia Beatty and
               Scott Dick and
               James Miller},
  title     = {A Survey and Analysis of the {P3P} Protocol's Agents, Adoption, Maintenance,
               and Future},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {2},
  pages     = {151--164},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.1004},
  doi       = {10.1109/TDSC.2007.1004},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ReayBDM07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ScherrerLOBA07,
  author    = {Antoine Scherrer and
               Nicolas Larrieu and
               Philippe Owezarski and
               Pierre Borgnat and
               Patrice Abry},
  title     = {Non-Gaussian and Long Memory Statistical Characterizations for Internet
               Traffic with Anomalies},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {1},
  pages     = {56--70},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.12},
  doi       = {10.1109/TDSC.2007.12},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ScherrerLOBA07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SerafiniBS07,
  author    = {Marco Serafini and
               Andrea Bondavalli and
               Neeraj Suri},
  title     = {Online Diagnosis and Recovery: On the Choice and Impact of Tuning
               Parameters},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {4},
  pages     = {295--312},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.70210},
  doi       = {10.1109/TDSC.2007.70210},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/SerafiniBS07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WuB07,
  author    = {Xiaoxin Wu and
               Elisa Bertino},
  title     = {An Analysis Study on Zone-Based Anonymous Communication in Mobile
               Ad Hoc Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {4},
  pages     = {252--265},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.70213},
  doi       = {10.1109/TDSC.2007.70213},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WuB07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YuSL07,
  author    = {Wei Yu and
               Yan Sun and
               K. J. Ray Liu},
  title     = {Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {3},
  pages     = {228--242},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.1006},
  doi       = {10.1109/TDSC.2007.1006},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/YuSL07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZouTG07,
  author    = {Cliff Changchun Zou and
               Donald F. Towsley and
               Weibo Gong},
  title     = {Modeling and Simulation Study of the Propagation and Defense of Internet
               E-mail Worms},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {4},
  number    = {2},
  pages     = {105--118},
  year      = {2007},
  url       = {https://doi.org/10.1109/TDSC.2007.1001},
  doi       = {10.1109/TDSC.2007.1001},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZouTG07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ArlatBHV06,
  author    = {Jean Arlat and
               Andrea Bondavalli and
               Boudewijn R. Haverkort and
               Paulo Ver{\'{\i}}ssimo},
  title     = {Guest Editorial for the Special Issue on the 2005 {IEEE/IFIP} Conference
               on Dependable Systems and Networks, including the Dependable Computing
               and Communications and Performance and Dependability Symposia},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {3},
  pages     = {169--171},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.36},
  doi       = {10.1109/TDSC.2006.36},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ArlatBHV06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BadishiKS06,
  author    = {Gal Badishi and
               Idit Keidar and
               Amir Sasson},
  title     = {Exposing and Eliminating Vulnerabilities to Denial of Service Attacks
               in Secure Gossip-Based Multicast},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {1},
  pages     = {45--61},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.12},
  doi       = {10.1109/TDSC.2006.12},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BadishiKS06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BakerP06,
  author    = {Zachary K. Baker and
               Viktor K. Prasanna},
  title     = {Automatic Synthesis of Efficient Intrusion Detection Systems on FPGAs},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {4},
  pages     = {289--300},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.44},
  doi       = {10.1109/TDSC.2006.44},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BakerP06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CiaramellaDSGT06,
  author    = {Angelo Ciaramella and
               Paolo D'Arco and
               Alfredo De Santis and
               Clemente Galdi and
               Roberto Tagliaferri},
  title     = {Neural Network Techniques for Proactive Password Checking},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {4},
  pages     = {327--339},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.53},
  doi       = {10.1109/TDSC.2006.53},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/CiaramellaDSGT06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DuDHV06,
  author    = {Wenliang Du and
               Jing Deng and
               Yunghsiang S. Han and
               Pramod K. Varshney},
  title     = {A Key Predistribution Scheme for Sensor Networks Using Deployment
               Knowledge},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {1},
  pages     = {62--77},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.2},
  doi       = {10.1109/TDSC.2006.2},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/DuDHV06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FuWD06,
  author    = {Anthony Y. Fu and
               Liu Wenyin and
               Xiaotie Deng},
  title     = {Detecting Phishing Web Pages with Visual Similarity Assessment Based
               on Earth Mover's Distance {(EMD)}},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {4},
  pages     = {301--311},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.50},
  doi       = {10.1109/TDSC.2006.50},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/FuWD06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HanWJ06,
  author    = {Junghee Han and
               David Watson and
               Farnam Jahanian},
  title     = {An Experimental Study of Internet Path Diversity},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {4},
  pages     = {273--288},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.43},
  doi       = {10.1109/TDSC.2006.43},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HanWJ06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Iyer06,
  author    = {Ravishankar K. Iyer},
  title     = {Editorial: Dependability and Security--Looking Foward to 2006},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {1},
  pages     = {1},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.11},
  doi       = {10.1109/TDSC.2006.11},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Iyer06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JiangCY06,
  author    = {Guofei Jiang and
               Haifeng Chen and
               Kenji Yoshihira},
  title     = {Modeling and Tracking of Transaction Flow Dynamics for Fault Detection
               in Complex Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {4},
  pages     = {312--326},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.52},
  doi       = {10.1109/TDSC.2006.52},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/JiangCY06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KemperMT06,
  author    = {Peter Kemper and
               Dennis M{\"{u}}ller and
               Axel Th{\"{u}}mmler},
  title     = {Combining Response Surface Methodology with Numerical Methods for
               Optimization of Markovian Models},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {3},
  pages     = {259--269},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.28},
  doi       = {10.1109/TDSC.2006.28},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KemperMT06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KhannaVB06,
  author    = {Gunjan Khanna and
               Padma Varadharajan and
               Saurabh Bagchi},
  title     = {Automated Online Monitoring of Distributed Applications through External
               Monitors},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {2},
  pages     = {115--129},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.17},
  doi       = {10.1109/TDSC.2006.17},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KhannaVB06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KimLCC06,
  author    = {Yoohwan Kim and
               Wing Cheong Lau and
               Mooi Choo Chuah and
               H. Jonathan Chao},
  title     = {PacketScore: {A} Statistics-Based Packet Filtering Scheme against
               Distributed Denial-of-Service Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {2},
  pages     = {141--155},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.25},
  doi       = {10.1109/TDSC.2006.25},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KimLCC06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiL06,
  author    = {Jiangtao Li and
               Ninghui Li},
  title     = {OACerts: Oblivious Attribute Certificates},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {4},
  pages     = {340--352},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.54},
  doi       = {10.1109/TDSC.2006.54},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiL06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MartinA06,
  author    = {Jean{-}Philippe Martin and
               Lorenzo Alvisi},
  title     = {Fast Byzantine Consensus},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {3},
  pages     = {202--215},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.35},
  doi       = {10.1109/TDSC.2006.35},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MartinA06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MartinA06a,
  author    = {Jean{-}Philippe Martin and
               Lorenzo Alvisi},
  title     = {Correction to "Fast Byzantine Consensus"},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {4},
  pages     = {400},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.45},
  doi       = {10.1109/TDSC.2006.45},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MartinA06a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MizrakCMS06,
  author    = {Alper Tugay Mizrak and
               Yuchung Cheng and
               Keith Marzullo and
               Stefan Savage},
  title     = {Detecting and Isolating Malicious Routers},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {3},
  pages     = {230--244},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.34},
  doi       = {10.1109/TDSC.2006.34},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MizrakCMS06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NebenzahlSW06,
  author    = {Danny Nebenzahl and
               Shmuel Sagiv and
               Avishai Wool},
  title     = {Install-Time Vaccination of Windows Executables to Defend against
               Stack Smashing Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {1},
  pages     = {78--90},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.14},
  doi       = {10.1109/TDSC.2006.14},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/NebenzahlSW06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/OzakiDOK06,
  author    = {Tatsuya Ozaki and
               Tadashi Dohi and
               Hiroyuki Okamura and
               Naoto Kaio},
  title     = {Distribution-Free Checkpoint Placement Algorithms Based on Min-Max
               Principle},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {2},
  pages     = {130--140},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.22},
  doi       = {10.1109/TDSC.2006.22},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/OzakiDOK06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PereiraMC06,
  author    = {Anil L. Pereira and
               Vineela Muppavarapu and
               Soon Myoung Chung},
  title     = {Role-Based Access Control for Grid Database Services Using the Community
               Authorization Service},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {2},
  pages     = {156--166},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.26},
  doi       = {10.1109/TDSC.2006.26},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PereiraMC06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PiromsopaE06,
  author    = {Krerk Piromsopa and
               Richard J. Enbody},
  title     = {Secure Bit: Transparent, Hardware Buffer-Overflow Protection},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {4},
  pages     = {365--376},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.56},
  doi       = {10.1109/TDSC.2006.56},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tdsc/PiromsopaE06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RajagopalanHJS06,
  author    = {Mohan Rajagopalan and
               Matti A. Hiltunen and
               Trevor Jim and
               Richard D. Schlichting},
  title     = {System Call Monitoring Using Authenticated System Calls},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {3},
  pages     = {216--229},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.41},
  doi       = {10.1109/TDSC.2006.41},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RajagopalanHJS06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SchiperT06,
  author    = {Andr{\'{e}} Schiper and
               Sam Toueg},
  title     = {From Set Membership to Group Membership: {A} Separation of Concerns},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {1},
  pages     = {2--12},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.13},
  doi       = {10.1109/TDSC.2006.13},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SchiperT06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SquicciariniBFR06,
  author    = {Anna Cinzia Squicciarini and
               Elisa Bertino and
               Elena Ferrari and
               Indrakshi Ray},
  title     = {Achieving Privacy in Trust Negotiations with an Ontology-Based Approach},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {1},
  pages     = {13--30},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.3},
  doi       = {10.1109/TDSC.2006.3},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SquicciariniBFR06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SridharanATK06,
  author    = {Vilas Sridharan and
               Hossein Asadi and
               Mehdi Baradaran Tahoori and
               David R. Kaeli},
  title     = {Reducing Data Cache Susceptibility to Soft Errors},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {4},
  pages     = {353--364},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.55},
  doi       = {10.1109/TDSC.2006.55},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SridharanATK06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/StrunkK06,
  author    = {Elisabeth A. Strunk and
               John C. Knight},
  title     = {Dependability through Assured Reconfiguration in Embedded System Software},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {3},
  pages     = {172--187},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.33},
  doi       = {10.1109/TDSC.2006.33},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/StrunkK06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ThummlerBT06,
  author    = {Axel Th{\"{u}}mmler and
               Peter Buchholz and
               Mikl{\'{o}}s Telek},
  title     = {A Novel Approach for Phase-Type Fitting with the {EM} Algorithm},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {3},
  pages     = {245--258},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.27},
  doi       = {10.1109/TDSC.2006.27},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ThummlerBT06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VoraN06,
  author    = {Adnan Vora and
               Mikhail Nesterenko},
  title     = {Secure Location Verification Using Radio Broadcast},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {4},
  pages     = {377--385},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.57},
  doi       = {10.1109/TDSC.2006.57},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/VoraN06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangL06,
  author    = {Shyh{-}Yih Wang and
               Chi{-}Sung Laih},
  title     = {Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment
               Scheme},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {1},
  pages     = {91--100},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.15},
  doi       = {10.1109/TDSC.2006.15},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangL06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangP06,
  author    = {Nicholas J. Wang and
               Sanjay J. Patel},
  title     = {ReStore: Symptom-Based Soft Error Detection in Microprocessors},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {3},
  pages     = {188--201},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.40},
  doi       = {10.1109/TDSC.2006.40},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangP06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XinidisCAAM06,
  author    = {Konstantinos Xinidis and
               Ioannis Charitakis and
               Spyros Antonatos and
               Kostas G. Anagnostakis and
               Evangelos P. Markatos},
  title     = {An Active Splitter Architecture for Intrusion Detection and Prevention},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {1},
  pages     = {31--44},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.6},
  doi       = {10.1109/TDSC.2006.6},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/XinidisCAAM06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YangDB06,
  author    = {Yanjiang Yang and
               Robert H. Deng and
               Feng Bao},
  title     = {A Practical Password-Based Two-Server Authentication and Key Exchange
               System},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {2},
  pages     = {105--114},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.16},
  doi       = {10.1109/TDSC.2006.16},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/YangDB06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangLLF06,
  author    = {Yanchao Zhang and
               Wei Liu and
               Wenjing Lou and
               Yuguang Fang},
  title     = {Securing Mobile Ad Hoc Networks with Certificateless Public Keys},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {3},
  number    = {4},
  pages     = {386--399},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.58},
  doi       = {10.1109/TDSC.2006.58},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhangLLF06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AmirNST05,
  author    = {Yair Amir and
               Cristina Nita{-}Rotaru and
               Jonathan Robert Stanton and
               Gene Tsudik},
  title     = {Secure Spread: An Integrated Architecture for Secure Group Communication},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {3},
  pages     = {248--261},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.39},
  doi       = {10.1109/TDSC.2005.39},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AmirNST05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BackesP05,
  author    = {Michael Backes and
               Birgit Pfitzmann},
  title     = {Relating Symbolic and Cryptographic Secrecy},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {2},
  pages     = {109--123},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.25},
  doi       = {10.1109/TDSC.2005.25},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BackesP05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BertaBV05,
  author    = {Istv{\'{a}}n Zsolt Berta and
               Levente Butty{\'{a}}n and
               Istv{\'{a}}n Vajda},
  title     = {A Framework for the Revocation of Unintended Digital Signatures Initiated
               by Malicious Terminals},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {3},
  pages     = {268--272},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.28},
  doi       = {10.1109/TDSC.2005.28},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BertaBV05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BertinoS05,
  author    = {Elisa Bertino and
               Ravi S. Sandhu},
  title     = {Database Security-Concepts, Approaches, and Challenges},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {1},
  pages     = {2--19},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.9},
  doi       = {10.1109/TDSC.2005.9},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BertinoS05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BowerOS05,
  author    = {Fred A. Bower and
               Sule Ozev and
               Daniel J. Sorin},
  title     = {Autonomic Microprocessor Execution via Self-Repairing Arrays},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {4},
  pages     = {297--310},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.44},
  doi       = {10.1109/TDSC.2005.44},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BowerOS05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChanGPM05,
  author    = {Haowen Chan and
               Virgil D. Gligor and
               Adrian Perrig and
               Gautam Muralidharan},
  title     = {On the Distribution and Revocation of Cryptographic Keys in Sensor
               Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {3},
  pages     = {233--247},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.37},
  doi       = {10.1109/TDSC.2005.37},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChanGPM05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChangAK05,
  author    = {Yung{-}Ruei Chang and
               Suprasad V. Amari and
               Sy{-}Yen Kuo},
  title     = {OBDD-Based Evaluation of Reliability and Importance Measures for Multistate
               Systems Subject to Imperfect Fault Coverage},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {4},
  pages     = {336--347},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.51},
  doi       = {10.1109/TDSC.2005.51},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ChangAK05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/EzhilchelvanS05,
  author    = {Paul D. Ezhilchelvan and
               Santosh K. Shrivastava},
  title     = {A Family of Trusted Third Party Based Fair-Exchange Protocols},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {4},
  pages     = {273--286},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.40},
  doi       = {10.1109/TDSC.2005.40},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/EzhilchelvanS05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FriedmanMR05,
  author    = {Roy Friedman and
               Achour Most{\'{e}}faoui and
               Michel Raynal},
  title     = {Simple and Efficient Oracle-Based Consensus Protocols for Asynchronous
               Byzantine Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {1},
  pages     = {46--56},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.13},
  doi       = {10.1109/TDSC.2005.13},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/FriedmanMR05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HeZY05,
  author    = {Xubin He and
               Ming Zhang and
               Qing Yang},
  title     = {{SPEK:} {A} Storage Performance Evaluation Kernel Module for Block-Level
               Storage Systems under Faulty Conditions},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {2},
  pages     = {138--149},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.27},
  doi       = {10.1109/TDSC.2005.27},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/HeZY05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Iyer05,
  author    = {Ravishankar K. Iyer},
  title     = {Editorial: State of the Journal Address},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {1},
  pages     = {1},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.10},
  doi       = {10.1109/TDSC.2005.10},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Iyer05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JoshiBG05,
  author    = {James Joshi and
               Elisa Bertino and
               Arif Ghafoor},
  title     = {An Analysis of Expressiveness and Design Issues for the Generalized
               Temporal Role-Based Access Control Model},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {2},
  pages     = {157--175},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.18},
  doi       = {10.1109/TDSC.2005.18},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/JoshiBG05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KohnoBC05,
  author    = {Tadayoshi Kohno and
               Andre Broido and
               Kimberly C. Claffy},
  title     = {Remote Physical Device Fingerprintin},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {2},
  pages     = {93--108},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.26},
  doi       = {10.1109/TDSC.2005.26},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KohnoBC05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KulkarniE05,
  author    = {Sandeep S. Kulkarni and
               Ali Ebnenasir},
  title     = {Complexity Issues in Automated Synthesis of Failsafe Fault-Tolerance},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {3},
  pages     = {201--215},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.29},
  doi       = {10.1109/TDSC.2005.29},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KulkarniE05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KulkarniE05a,
  author    = {Sandeep S. Kulkarni and
               Ali Ebnenasir},
  title     = {The Effect of the Specification Model on the Complexity of Adding
               Masking Fault Tolerance},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {4},
  pages     = {348--355},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.52},
  doi       = {10.1109/TDSC.2005.52},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KulkarniE05a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiSJ05,
  author    = {Yingjiu Li and
               Vipin Swarup and
               Sushil Jajodia},
  title     = {Fingerprinting Relational Databases: Schemes and Specialties},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {1},
  pages     = {34--45},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.12},
  doi       = {10.1109/TDSC.2005.12},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LiSJ05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LuoHE05,
  author    = {Jun Luo and
               Jean{-}Pierre Hubaux and
               Patrick Th. Eugster},
  title     = {{DICTATE:} DIstributed CerTification Authority with probabilisTic
               frEshness for Ad Hoc Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {4},
  pages     = {311--323},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.49},
  doi       = {10.1109/TDSC.2005.49},
  timestamp = {Fri, 17 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/LuoHE05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MirkovicR05,
  author    = {Jelena Mirkovic and
               Peter L. Reiher},
  title     = {{D-WARD:} {A} Source-End Defense against Flooding Denial-of-Service
               Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {3},
  pages     = {216--232},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.35},
  doi       = {10.1109/TDSC.2005.35},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MirkovicR05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NguyenR05,
  author    = {Cung Nguyen and
               G. Robert Redinbo},
  title     = {Fault Tolerance Design in {JPEG} 2000 Image Compression System},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {1},
  pages     = {57--75},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.11},
  doi       = {10.1109/TDSC.2005.11},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/NguyenR05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/OorschotSW05,
  author    = {Paul C. van Oorschot and
               Anil Somayaji and
               Glenn Wurster},
  title     = {Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {2},
  pages     = {82--92},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.24},
  doi       = {10.1109/TDSC.2005.24},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/OorschotSW05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PaxsonW05,
  author    = {Vern Paxson and
               Michael Waidner},
  title     = {Guest Editor's Introduction: 2005 {IEEE} Symposium on Security and
               Privacy},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {2},
  pages     = {81},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.23},
  doi       = {10.1109/TDSC.2005.23},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PaxsonW05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PomeranzR05,
  author    = {Irith Pomeranz and
               Sudhakar M. Reddy},
  title     = {Concurrent Online Testing of Identical Circuits Using Nonidentical
               Input Vectors},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {3},
  pages     = {190--200},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.30},
  doi       = {10.1109/TDSC.2005.30},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/PomeranzR05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Shao05,
  author    = {Benjamin B. M. Shao},
  title     = {Optimal Redundancy Allocation for Information Technology Disaster
               Recovery in the Network Economy},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {3},
  pages     = {262--267},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.38},
  doi       = {10.1109/TDSC.2005.38},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Shao05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SunNW05,
  author    = {Kun Sun and
               Peng Ning and
               Cliff Wang},
  title     = {Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor
               Networks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {3},
  pages     = {177--189},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.36},
  doi       = {10.1109/TDSC.2005.36},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SunNW05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Tsai05,
  author    = {Jichiang Tsai},
  title     = {An Efficient Index-Based Checkpointing Protocol with Constant-Size
               Control Information on Messages},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {4},
  pages     = {287--296},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.42},
  doi       = {10.1109/TDSC.2005.42},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Tsai05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VaidyanathanT05,
  author    = {Kalyanaraman Vaidyanathan and
               Kishor S. Trivedi},
  title     = {A Comprehensive Model for Software Rejuvenation},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {2},
  pages     = {124--137},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.15},
  doi       = {10.1109/TDSC.2005.15},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/VaidyanathanT05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VoyiatzisH05,
  author    = {Ioannis Voyiatzis and
               Constantin Halatsis},
  title     = {A Low-Cost Concurrent {BIST} Scheme for Increased Dependability},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {2},
  pages     = {150--156},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.16},
  doi       = {10.1109/TDSC.2005.16},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/VoyiatzisH05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YuanM05,
  author    = {Jian Yuan and
               Kevin L. Mills},
  title     = {Monitoring the Macroscopic Effect of DDoS Flooding Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {4},
  pages     = {324--335},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.50},
  doi       = {10.1109/TDSC.2005.50},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/YuanM05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhaoMM05,
  author    = {Wenbing Zhao and
               Louise E. Moser and
               P. M. Melliar{-}Smith},
  title     = {Unification of Transactions and Replication in Three-Tier Architectures
               Based on {CORBA}},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {2},
  number    = {1},
  pages     = {20--33},
  year      = {2005},
  url       = {https://doi.org/10.1109/TDSC.2005.14},
  doi       = {10.1109/TDSC.2005.14},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ZhaoMM05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AtluriC04,
  author    = {Vijayalakshmi Atluri and
               Soon Ae Chun},
  title     = {An Authorization Model for Geospatial Data},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {4},
  pages     = {238--254},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.32},
  doi       = {10.1109/TDSC.2004.32},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AtluriC04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AvizienisLRL04,
  author    = {Algirdas Avizienis and
               Jean{-}Claude Laprie and
               Brian Randell and
               Carl E. Landwehr},
  title     = {Basic Concepts and Taxonomy of Dependable and Secure Computing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {1},
  pages     = {11--33},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.2},
  doi       = {10.1109/TDSC.2004.2},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AvizienisLRL04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BartlettS04,
  author    = {Wendy Bartlett and
               Lisa Spainhower},
  title     = {Commercial Fault Tolerance: {A} Tale of Two Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {1},
  pages     = {87--96},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.4},
  doi       = {10.1109/TDSC.2004.4},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BartlettS04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BondavalliCCR04,
  author    = {Andrea Bondavalli and
               Silvano Chiaradonna and
               Domenico Cotroneo and
               Luigi Romano},
  title     = {Effective Fault Treatment for Improving the Dependability of {COTS}
               and Legacy-Based Applications},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {4},
  pages     = {223--237},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.40},
  doi       = {10.1109/TDSC.2004.40},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BondavalliCCR04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ElnozahyP04,
  author    = {E. N. Elnozahy and
               James S. Plank},
  title     = {Checkpointing for Peta-Scale Systems: {A} Look into the Future of
               Practical Rollback-Recovery},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {2},
  pages     = {97--108},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.15},
  doi       = {10.1109/TDSC.2004.15},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ElnozahyP04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KarnikHP04,
  author    = {Tanay Karnik and
               Peter Hazucha and
               Jagdish Patel},
  title     = {Characterization of Soft Errors Caused by Single Event Upsets in {CMOS}
               Processes},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {2},
  pages     = {128--143},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.14},
  doi       = {10.1109/TDSC.2004.14},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KarnikHP04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Leveson04,
  author    = {Nancy G. Leveson},
  title     = {A Systems-Theoretic Approach to Safety in Software-Intensive Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {1},
  pages     = {66--86},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.1},
  doi       = {10.1109/TDSC.2004.1},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Leveson04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MarshS04,
  author    = {Michael A. Marsh and
               Fred B. Schneider},
  title     = {{CODEX:} {A} Robust and Secure Secret Distribution System},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {1},
  pages     = {34--47},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.3},
  doi       = {10.1109/TDSC.2004.3},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MarshS04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NicolST04,
  author    = {David M. Nicol and
               William H. Sanders and
               Kishor S. Trivedi},
  title     = {Model-Based Evaluation: From Dependability to Security},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {1},
  pages     = {48--65},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.11},
  doi       = {10.1109/TDSC.2004.11},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/NicolST04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ParnoR04,
  author    = {Bryan Parno and
               Mema Roussopoulos},
  title     = {Defending a {P2P} Digital Preservation System},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {4},
  pages     = {209--222},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.39},
  doi       = {10.1109/TDSC.2004.39},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ParnoR04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RatanpalWB04,
  author    = {Girish B. Ratanpal and
               Ronald D. Williams and
               Travis N. Blalock},
  title     = {An On-Chip Signal Suppression Countermeasure to Power Analysis Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {3},
  pages     = {179--189},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.25},
  doi       = {10.1109/TDSC.2004.25},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RatanpalWB04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SiewiorekCK04,
  author    = {Daniel P. Siewiorek and
               Ram Chillarege and
               Zbigniew Kalbarczyk},
  title     = {Reflections on Industry Trends and Experimental Research in Dependability},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {2},
  pages     = {109--127},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.20},
  doi       = {10.1109/TDSC.2004.20},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SiewiorekCK04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ValeurVKK04,
  author    = {Fredrik Valeur and
               Giovanni Vigna and
               Christopher Kr{\"{u}}gel and
               Richard A. Kemmerer},
  title     = {A Comprehensive Approach to Intrusion Detection Alert Correlation},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {3},
  pages     = {146--169},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.21},
  doi       = {10.1109/TDSC.2004.21},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ValeurVKK04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangZS04,
  author    = {Haining Wang and
               Danlu Zhang and
               Kang G. Shin},
  title     = {Change-Point Monitoring for the Detection of DoS Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {4},
  pages     = {193--208},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.34},
  doi       = {10.1109/TDSC.2004.34},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangZS04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Yi04,
  author    = {Xun Yi},
  title     = {Identity-Based Fault-Tolerant Conference Key Agreement},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {3},
  pages     = {170--178},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.31},
  doi       = {10.1109/TDSC.2004.31},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Yi04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics