


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 11
Volume 11, Number 1, January - February 2014
- Elisa Bertino:
Editorial. 1 - Hannes Holm:
A Large-Scale Study of the Time Required to Compromise a Computer System. 2-15 - Leandro Fiorin, Mariagiovanna Sami:
Fault-Tolerant Network Interfaces for Networks-on-Chip. 16-29 - Lingyu Wang, Sushil Jajodia
, Anoop Singhal, Pengsu Cheng, Steven Noel:
k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities. 30-44 - Satya Gautam Vadlamudi, Partha Pratim Chakrabarti:
Robustness Analysis of Embedded Control Systems with Respect to Signal Perturbations: Finding Minimal Counterexamples Using Fault Injection. 45-58 - Noman Mohammed, Dima Alhadidi, Benjamin C. M. Fung
, Mourad Debbabi
:
Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data. 59-71 - Nicola Basilico
, Nicola Gatti
, Mattia Monga
, Sabrina Sicari:
Security Games for Node Localization through Verifiable Multilateration. 72-85
Volume 11, Number 2, March - April 2014
- José Fonseca
, Nuno Seixas
, Marco Vieira
, Henrique Madeira
:
Analysis of Field Data on Web Security Vulnerabilities. 89-100 - Xin Li, Xinyuan Wang, Wentao Chang:
CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution. 101-114 - Qinghua Li, Guohong Cao, Thomas F. La Porta:
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing. 115-129 - Jing Zhao, Kishor S. Trivedi, Michael Grottke
, Javier Alonso, Yanbin Wang:
Ensuring the Performance of Apache HTTP Server Affected by Aging. 130-141 - Gorrell P. Cheek, Mohamed Shehab
:
Human Effects of Enhanced Privacy Management Models. 142-154 - Xun Yi, Elisa Bertino, Jaideep Vaidya, Chaoping Xing:
Private Searching on Streaming Data Based on Keyword Frequency. 155-167 - Hussain M. J. Almohri
, Danfeng Yao
, Dennis G. Kafura:
Process Authentication for High System Assurance. 168-180 - Yang Qin, Dijiang Huang
, Bing Li:
STARS: A Statistical Traffic Pattern Discovery System for MANETs. 181-192 - Kizito Salako, Lorenzo Strigini:
When Does "Diversity" in Development Reduce Common Failures? Insights from Probabilistic Modeling. 193-206
Volume 11, Number 3, May - June 2014
- Yury Zhauniarovich, Giovanni Russello, Mauro Conti
, Bruno Crispo, Earlence Fernandes:
MOSES: Supporting and Enforcing Security Profiles on Smartphones. 211-223 - Adam Skillen, Mohammad Mannan:
Mobiflage: Deniable Storage Encryptionfor Mobile Devices. 224-237 - Christopher S. Gates, Ninghui Li, Hao Peng, Bhaskar Pratim Sarma, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy:
Generating Summary Risk Scores for Mobile Applications. 238-251 - Christopher S. Gates, Jing Chen, Ninghui Li, Robert W. Proctor:
Effective Risk Communication for Android Apps. 252-265 - Reza Shokri, George Theodorakopoulos
, Panos Papadimitratos, Ehsan Kazemi
, Jean-Pierre Hubaux:
Hiding in the Mobile Crowd: LocationPrivacy through Collaboration. 266-279 - Alessio Merlo, Mauro Migliardi
, Nicola Gobbo, Francesco Palmieri
, Aniello Castiglione
:
A Denial of Service Attack to UMTS Networks Using SIM-Less Devices. 280-291 - Younho Lee
:
Secure Ordered Bucketization. 292-303
Volume 11, Number 4, July - August 2014
- Silvio Cesare, Yang Xiang
, Wanlei Zhou
:
Control Flow-Based Malware VariantDetection. 307-317 - Pietro Colombo
, Elena Ferrari
:
Enforcing Obligations within RelationalDatabase Management Systems. 318-331 - Fengwei Zhang, Jiang Wang, Kun Sun, Angelos Stavrou
:
HyperCheck: A Hardware-AssistedIntegrity Monitor. 332-344 - Shu Yin, Xiaojun Ruan, Adam Manzanares, Xiao Qin, Kenli Li:
MINT: A Reliability Modeling Frameworkfor Energy-Efficient Parallel Disk Systems. 345-360 - Sheng Wen
, Wei Zhou, Jun Zhang
, Yang Xiang
, Wanlei Zhou
, Weijia Jia
, Cliff C. Zou:
Modeling and Analysis on the Propagation Dynamics of Modern Email Malware. 361-374 - Ruofan Xia, Xiaoyan Yin, Javier Alonso Lopez, Fumio Machida, Kishor S. Trivedi:
Performance and Availability Modeling of ITSystems with Data Backup and Restore. 375-389 - Wenhong Tian, Yu Chen, Xinyang Wang:
A Note on "Orchestrating an Ensemble of MapReduce Jobs for Minimizing Their Makespan". 390-391 - Kyuseung Han, Ganghee Lee, Kiyoung Choi:
Software-Level Approaches for Tolerating Transient Faults in a Coarse-GrainedReconfigurable Architecture. 392-398
Volume 11, Number 5, September - October 2014
- Jaideep Vaidya, Basit Shafiq, Wei Fan, Danish Mehmood, David Lorenzi:
A Random Decision Tree Framework for Privacy-Preserving Data Mining. 399-411 - Puneet Gupta
, Scott D. Stoller, Zhongyuan Xu:
Abductive Analysis of Administrative Policies in Rule-Based Access Control. 412-424 - Marc Liberatore, Brian Neil Levine, Clay Shields, Brian Lynn:
Efficient Tagging of Remote Peers during Child Pornography Investigations. 425-439 - José Fonseca
, Marco Vieira
, Henrique Madeira
:
Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection. 440-453 - Kwantae Cho, Byung-Gil Lee, Dong Hoon Lee:
Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks. 454-466 - Yogachandran Rahulamathavan
, Raphael Chung-Wei Phan
, Suresh Veluru, Kanapathippillai Cumanan, Muttukrishnan Rajarajan:
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud. 467-479 - Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose, Paul C. van Oorschot
:
Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion. 480-493 - Libor Polcak, Jakub Jirasek, Petr Matousek
:
Comment on "Remote Physical Device Fingerprinting". 494-496
Volume 11, Number 6, November - December 2014
- Lotfi Ben Othmane, Pelin Angin
, Harold Weffers, Bharat K. Bhargava:
Extending the Agile Development Process to Develop Acceptably Secure Software. 497-509 - Sabrina De Capitani di Vimercati
, Sara Foresti
, Sushil Jajodia
, Giovanni Livraga
, Stefano Paraboschi
, Pierangela Samarati
:
Fragmentation in Presence of Data Dependencies. 510-523 - Jianzhong Huang, Xiao Qin, Fenghao Zhang, Wei-Shinn Ku
, Changsheng Xie:
MFTS: A Multi-Level Fault-Tolerant Archiving Storage with Optimized Maintenance Bandwidth. 524-537 - Wen Ming Liu, Lingyu Wang, Pengsu Cheng, Kui Ren
, Shunzhi Zhu, Mourad Debbabi
:
PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications. 538-552 - Christophe Foket, Bjorn De Sutter, Koen De Bosschere:
Pushing Java Type Obfuscation to the Limit. 553-567 - Jin Tang, Yu Cheng
, Yong Hao, Wei Song:
SIP Flooding Attack Detection with a Multi-Dimensional Sketch Design. 582-595

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.