default search action
IEEE Transactions on Dependable and Secure Computing, Volume 15
Volume 15, Number 1, January - February 2018
- Jaideep Vaidya:
Editorial. 1 - Arash Nourian, Stuart E. Madnick:
A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet. 2-13 - Saurabh Shintre, Virgil D. Gligor, João Barros:
Anonymity Leakage in Private VoIP Networks. 14-26 - Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Rongxing Lu, Jian Weng:
Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers. 27-39 - Domenico Cotroneo, Anna Lanzaro, Roberto Natella:
Faultprog: Testing the Accuracy of Binary-Level Software Fault Injection. 40-53 - Xianfu Meng, Dongxu Liu:
GeTrust: A Guarantee-Based Trust Model in Chord-Based P2P Networks. 54-68 - Attila Altay Yavuz:
Immutable Authentication and Integrity Schemes for Outsourced Databases. 69-82 - Andrea Saracino, Daniele Sgandurra, Gianluca Dini, Fabio Martinelli:
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention. 83-97 - Peng Zhou, Rocky K. C. Chang, Xiaojing Gu, Minrui Fei, Jianying Zhou:
Magic Train: Design of Measurement Methods against Bandwidth Inflation Attacks. 98-111 - Dongdong Zhao, Wenjian Luo, Ran Liu, Lihua Yue:
Negative Iris Recognition. 112-125 - Yuchang Mo, Liudong Xing, Joanne Bechta Dugan:
Performability Analysis of k-to-l-Out-of-n Computing Systems Using Binary Decision Diagrams. 126-137 - Fumio Machida, Ruofan Xia, Kishor S. Trivedi:
Performability Modeling for RAID Storage Systems by Markov Regenerative Process. 138-150 - Jin-Hee Cho, Ing-Ray Chen:
PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks. 151-165 - Jiao Jiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou:
Rumor Source Identification in Social Networks with Time-Varying Topology. 166-179
Volume 15, Number 2, March - April 2018
- Hung-Min Sun, Shiuan-Tung Chen, Jyh-Haw Yeh, Chia-Yun Cheng:
A Shoulder Surfing Resistant Graphical Authentication System. 180-193 - Bing Li, Dijiang Huang, Zhijie Wang, Yan Zhu:
Attribute-based Access Control for ICN Naming Scheme. 194-206 - Nai-Wen Chang, Sun-Yuan Hsieh:
Conditional Diagnosability of (n, k)-Star Graphs Under the PMC Model. 207-216 - Xinxin Zhao, Lingjun Li, Guoliang Xue, Gail-Joon Ahn:
Efficient Anonymous Message Submission. 217-230 - Yan Li, Yingjiu Li, Ke Xu, Qiang Yan, Robert H. Deng:
Empirical Study of Face Authentication Systems Under OSNFD Attacks. 231-245 - Eduardo Adílio Pelinson Alchieri, Alysson Bessani, Fabíola Greve, Joni da Silva Fraga:
Knowledge Connectivity Requirements for Solving Byzantine Consensus with Unknown Participants. 246-259 - Taeho Jung, Junze Han, Xiang-Yang Li:
PDA: Semantically Secure Time-Series Data Analytics with Dynamic User Groups. 260-274 - Thomas Roth, Bruce M. McMillin:
Physical Attestation in the Smart Grid for Distributed State Verification. 275-288 - Martin Goll, Shay Gueron:
Randomness Tests in Hostile Environments. 289-294 - Naeimeh Laleh, Barbara Carminati, Elena Ferrari:
Risk Assessment in Social Networks Based on User Anomalous Behaviors. 295-308 - Weili Han, Zhigong Li, Minyue Ni, Guofei Gu, Wenyuan Xu:
Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis. 309-320 - Fengwei Zhang, Kevin Leach, Angelos Stavrou, Haining Wang:
Towards Transparent Debugging. 321-335 - Nosayba El-Sayed, Bianca Schroeder:
Understanding Practical Tradeoffs in HPC Checkpoint-Scheduling Policies. 336-350 - Chia-Chen Wei, Chun-An Chen, Sun-Yuan Hsieh:
Conditional (t, k)-Diagnosis in Regular and Irregular Graphs Under the Comparison Diagnosis Model. 351-356 - Myungsun Kim, Hyung Tae Lee, San Ling, Huaxiong Wang:
On the Efficiency of FHE-Based Private Queries. 357-363
Volume 15, Number 3, May - June 2018
- Elias Bou-Harb, Chadi Assi, Mourad Debbabi:
CSC-Detector: A System to Infer Large-Scale Probing Campaigns. 364-377 - Fanfu Zhou, Zhengwei Qi, Jianguo Yao, Ruhui Ma, Bin Wang, Athanasios V. Vasilakos, Haibing Guan:
D2FL: Design and Implementation of Distributed Dynamic Fault Localization. 378-392 - David A. Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski:
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure. 393-408 - Hui Cui, Zhiguo Wan, Robert H. Deng, Guilin Wang, Yingjiu Li:
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud. 409-422 - Hossen Asiful Mustafa, Wenyuan Xu, Ahmad-Reza Sadeghi, Steffen Schulz:
End-to-End Detection of Caller ID Spoofing Attacks. 423-436 - Dmitry Evtyushkin, Jesse Elwell, Meltem Ozsoy, Dmitry Ponomarev, Nael B. Abu-Ghazaleh, Ryan Riley:
Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications. 437-451 - Petr Novotný, Bong Jun Ko, Alexander L. Wolf:
Locating Faults in MANET-Hosted Software Systems. 452-465 - Christos Tsigkanos, Liliana Pasquale, Carlo Ghezzi, Bashar Nuseibeh:
On the Interplay Between Cyber and Physical Spaces for Adaptive Security. 466-480 - Dan Bogdanov, Liina Kamm, Sven Laur, Ville Sokk:
Rmind: A Tool for Cryptographically Secure Statistical Analysis. 481-495 - Qian Wang, Meiqi He, Minxin Du, Sherman S. M. Chow, Russell W. F. Lai, Qin Zou:
Searchable Encryption over Feature-Rich Data. 496-510 - Miguel Garcia, Nuno Neves, Alysson Bessani:
SieveQ: A Layered BFT Protection System for Critical Services. 511-525 - Fathiyeh Faghih, Borzoo Bonakdarpour:
Symbolic Synthesis of Timed Models with Strict 2-Phase Fault Recovery. 526-541 - Limei Lin, Li Xu, Dajin Wang, Shuming Zhou:
The g-Good-Neighbor Conditional Diagnosability of Arrangement Graphs. 542-548
Volume 15, Number 4, July - August 2018
- Meikang Qiu, Yang Xiang, Yan Zhang:
Guest Editor's Introduction to the Special Section on Social Network Security. 549-550 - Muhammad Usman Shahid Khan, Mazhar Ali, Assad Abbas, Samee U. Khan, Albert Y. Zomaya:
Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter. 551-560 - Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling. 561-576 - Zhipeng Cai, Zaobo He, Xin Guan, Yingshu Li:
Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks. 577-590 - Qian Wang, Yan Zhang, Xiao Lu, Zhibo Wang, Zhan Qin, Kui Ren:
Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy. 591-606 - Kuan Zhang, Xiaohui Liang, Jianbing Ni, Kan Yang, Xuemin Sherman Shen:
Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage. 607-620 - Meriem Guerar, Mauro Migliardi, Alessio Merlo, Mohamed Benmohammed, Francesco Palmieri, Aniello Castiglione:
Using Screen Brightness to Improve Security in Mobile Social Network Access. 621-632 - Debiao He, Neeraj Kumar, Huaqun Wang, Lina Wang, Kim-Kwang Raymond Choo, Alexey V. Vinel:
A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network. 633-645 - Huaxin Li, Haojin Zhu, Suguo Du, Xiaohui Liang, Xuemin Sherman Shen:
Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense. 646-660 - Majed A. AlRubaian, Muhammad Al-Qurishi, Mohammad Mehedi Hassan, Atif Alamri:
A Credibility Analysis System for Assessing Information on Twitter. 661-674 - Pengfei Chen, Yong Qi, Xinyi Li, Di Hou, Michael Rung-Tsong Lyu:
ARF-Predictor: Effective Prediction of Aging-Related Failure Using Entropy. 675-693 - Jan Stanek, Lukas Kencl:
Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage. 694-707 - Ding Wang, Ping Wang:
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound. 708-722 - Masahiro Kaminaga, Hideki Yoshikawa, Arimitsu Shikoda, Toshinori Suzuki:
Crashing Modulus Attack on Modular Squaring for Rabin Cryptosystem. 723-728
Volume 15, Number 5, September - October 2018
- Anastasios N. Bikos, Nicolas Sklavos:
Architecture Design of an Area Efficient High Speed Crypto Processor for 4G LTE. 729-741 - Le Guan, Jingqiang Lin, Ziqiang Ma, Bo Luo, Luning Xia, Jiwu Jing:
Copker: A Cryptographic Engine Against Cold-Boot Attacks. 742-754 - Alireza Shameli-Sendi, Habib Louafi, Wenbo He, Mohamed Cheriet:
Dynamic Optimal Countermeasure Selection for Intrusion Response System. 755-770 - Suchul Lee, Sungho Kim, Sungil Lee, Jaehyuk Choi, Hanjun Yoon, Dohoon Lee, Jun-Rak Lee:
LARGen: Automatic Signature Generation for Malwares Using Latent Dirichlet Allocation. 771-783 - Qiang Tang, Jun Wang:
Privacy-Preserving Friendship-Based Recommender Systems. 784-796 - Jin Soo Jang, Changho Choi, Jae-Hyuk Lee, Nohyun Kwak, Seongman Lee, Yeseul Choi, Brent ByungHoon Kang:
PrivateZone: Providing a Private Execution Environment Using ARM TrustZone. 797-810 - Daniel Sun, Alan D. Fekete, Vincent Gramoli, Guoqiang Li, Xiwei Xu, Liming Zhu:
R2C: Robust Rolling-Upgrade in Clouds. 811-823 - Santanu Chatterjee, Sandip Roy, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, Athanasios V. Vasilakos:
Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment. 824-839 - Nurzhan Zhumabekuly Aitzhan, Davor Svetinovic:
Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams. 840-852 - Tao Wang, Yao Liu, Tao Hou, Qingqi Pei, Song Fang:
Signal Entanglement Based Pinpoint Waveforming for Location-Restricted Service Access Control. 853-867 - Xingliang Yuan, Xinyu Wang, Cong Wang, Anna Cinzia Squicciarini, Kui Ren:
Towards Privacy-Preserving and Practical Image-Centric Social Discovery. 868-882 - Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei:
White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively. 883-897 - Ruben Lumbiarres-Lopez, Mariano López-García, Enrique F. Cantó-Navarro:
Hardware Architecture Implemented on FPGA for Protecting Cryptographic Keys against Side-Channel Attacks. 898-905 - Xingxin Li, Youwen Zhu, Jian Wang, Zhe Liu, Yining Liu, Mingwu Zhang:
On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification. 906-912
Volume 15, Number 6, November - December 2018
- Domenico Cotroneo, Karthik Pattabiraman, Antonio Pecchia:
Guest Editors' Introduction: Special Issue on Data-Driven Dependability and Security. 913-914 - Saurabh Jha, Valerio Formicola, Catello Di Martino, Mark Dalton, William T. Kramer, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Resiliency of HPC Interconnects: A Case Study of Interconnect Failures and Recovery in Blue Waters. 915-930 - Pinjia He, Jieming Zhu, Shilin He, Jian Li, Michael R. Lyu:
Towards Automated Log Parsing for Large-Scale Log Data Analysis. 931-944 - Oliver Schwahn, Stefan Winter, Nicolas Coppik, Neeraj Suri:
How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code. 945-958 - Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan:
Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks. 959-973 - Santosh Aditham, Nagarajan Ranganathan:
A System Architecture for the Detection of Insider Attacks in Big Data Systems. 974-987 - Christopher N. Gutierrez, Taegyu Kim, Raffaele Della Corte, Jeffrey Avery, Dan Goldwasser, Marcello Cinque, Saurabh Bagchi:
Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks. 988-1001 - Pontus Johnson, Robert Lagerström, Mathias Ekstedt, Ulrik Franke:
Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis. 1002-1015 - Bo Liu, Wanlei Zhou, Longxiang Gao, Haibo Zhou, Tom H. Luan, Sheng Wen:
Malware Propagations in Wireless Ad Hoc Networks. 1016-1026 - Boyang Wang, Xinxin Fan:
Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data. 1027-1040 - Jun Young Kim, Wen Hu, Hossein Shafagh, Sanjay Jha:
SEDA: Secure Over-the-Air Code Dissemination Protocol for the Internet of Things. 1041-1054 - Zhenxing Qian, Hang Zhou, Xinpeng Zhang, Weiming Zhang:
Separable Reversible Data Hiding in Encrypted JPEG Bitstreams. 1055-1067 - Jinxue Zhang, Rui Zhang, Yanchao Zhang, Guanhua Yan:
The Rise of Social Botnets: Attacks and Countermeasures. 1068-1082 - Zhiguo Wan, Robert H. Deng:
VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data. 1083-1095
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.