Search dblp for Publications

export results for "toc:db/journals/tdsc/tdsc9.bht:"

 download as .bib file

@article{DBLP:journals/tdsc/AlsalehMO12,
  author       = {Mansour Alsaleh and
                  Mohammad Mannan and
                  Paul C. van Oorschot},
  title        = {Revisiting Defenses against Large-Scale Online Password Guessing Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {1},
  pages        = {128--141},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.24},
  doi          = {10.1109/TDSC.2011.24},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/AlsalehMO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AydayF12,
  author       = {Erman Ayday and
                  Faramarz Fekri},
  title        = {Iterative Trust and Reputation Management Using Belief Propagation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {3},
  pages        = {375--386},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.64},
  doi          = {10.1109/TDSC.2011.64},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/AydayF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BarkerG12,
  author       = {Steve Barker and
                  Valerio Genovese},
  title        = {Access Control with Privacy Enhancements a Unified Approach},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {5},
  pages        = {670--683},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.22},
  doi          = {10.1109/TDSC.2012.22},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BarkerG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BarthRSMSB12,
  author       = {Adam Barth and
                  Benjamin I. P. Rubinstein and
                  Mukund Sundararajan and
                  John C. Mitchell and
                  Dawn Song and
                  Peter L. Bartlett},
  title        = {A Learning-Based Approach to Reactive Security},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {482--493},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.42},
  doi          = {10.1109/TDSC.2011.42},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BarthRSMSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BishopEHW12,
  author       = {Matt Bishop and
                  Sophie Engle and
                  Damien Howard and
                  Sean Whalen},
  title        = {A Taxonomy of Buffer Overflow Characteristics},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {3},
  pages        = {305--317},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.10},
  doi          = {10.1109/TDSC.2012.10},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BishopEHW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BorranHSS12,
  author       = {Fatemeh Borran and
                  Martin Hutle and
                  Nuno Santos and
                  Andr{\'{e}} Schiper},
  title        = {Quantitative Analysis of Consensus Algorithms},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {2},
  pages        = {236--249},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.48},
  doi          = {10.1109/TDSC.2011.48},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BorranHSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BrickellL12,
  author       = {Ernie Brickell and
                  Jiangtao Li},
  title        = {Enhanced Privacy {ID:} {A} Direct Anonymous Attestation Scheme with
                  Enhanced Revocation Capabilities},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {3},
  pages        = {345--360},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.63},
  doi          = {10.1109/TDSC.2011.63},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BrickellL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Chandrasekhar0S12,
  author       = {Santosh Chandrasekhar and
                  Saikat Chakrabarti and
                  Mukesh Singhal},
  title        = {A Trapdoor Hash-Based Mechanism for Stream Authentication},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {5},
  pages        = {699--713},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.48},
  doi          = {10.1109/TDSC.2012.48},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Chandrasekhar0S12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChangH12,
  author       = {Nai{-}Wen Chang and
                  Sun{-}Yuan Hsieh},
  title        = {Conditional Diagnosability of Augmented Cubes under the {PMC} Model},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {1},
  pages        = {46--60},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2010.59},
  doi          = {10.1109/TDSC.2010.59},
  timestamp    = {Mon, 29 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChangH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChasakiW12,
  author       = {Danai Chasaki and
                  Tilman Wolf},
  title        = {Attacks and Defenses in the Data Plane of Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {6},
  pages        = {798--810},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.50},
  doi          = {10.1109/TDSC.2012.50},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChasakiW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChenLWH12,
  author       = {Xiaodao Chen and
                  Chen Liao and
                  Tongquan Wei and
                  Shiyan Hu},
  title        = {An Interconnect Reliability-Driven Routing Technique for Electromigration
                  Failure Avoidance},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {5},
  pages        = {770--776},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2010.57},
  doi          = {10.1109/TDSC.2010.57},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChenLWH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChenNM12,
  author       = {You Chen and
                  Steve Nyemba and
                  Bradley A. Malin},
  title        = {Detecting Anomalous Insiders in Collaborative Information Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {3},
  pages        = {332--344},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.11},
  doi          = {10.1109/TDSC.2012.11},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChenNM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChiassonSFBO12,
  author       = {Sonia Chiasson and
                  Elizabeth Stobert and
                  Alain Forget and
                  Robert Biddle and
                  Paul C. van Oorschot},
  title        = {Persuasive Cued Click-Points: Design, Implementation, and Evaluation
                  of a Knowledge-Based Authentication Mechanism},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {2},
  pages        = {222--235},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.55},
  doi          = {10.1109/TDSC.2011.55},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChiassonSFBO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChuGWJ12,
  author       = {Zi Chu and
                  Steven Gianvecchio and
                  Haining Wang and
                  Sushil Jajodia},
  title        = {Detecting Automation of Twitter Accounts: Are You a Human, Bot, or
                  Cyborg?},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {6},
  pages        = {811--824},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.75},
  doi          = {10.1109/TDSC.2012.75},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChuGWJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CortinasFGLLPA12,
  author       = {Roberto Corti{\~{n}}as and
                  Felix C. Freiling and
                  Marjan Ghajar{-}Azadanlou and
                  Alberto Lafuente and
                  Mikel Larrea and
                  Lucia Draque Penso and
                  Iratxe Soraluze Arriola},
  title        = {Secure Failure Detection and Consensus in TrustedPals},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {610--625},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.23},
  doi          = {10.1109/TDSC.2012.23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CortinasFGLLPA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CucurullANS12,
  author       = {Jordi Cucurull and
                  Mikael Asplund and
                  Simin Nadjm{-}Tehrani and
                  Tiziano Santoro},
  title        = {Surviving Attacks in Challenged Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {6},
  pages        = {917--929},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.67},
  doi          = {10.1109/TDSC.2012.67},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CucurullANS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DaiPJX12,
  author       = {Weiqi Dai and
                  T. Paul Parker and
                  Hai Jin and
                  Shouhuai Xu},
  title        = {Enhancing Data Trustworthiness via Assured Digital Signing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {6},
  pages        = {838--851},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.71},
  doi          = {10.1109/TDSC.2012.71},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DaiPJX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DasI12,
  author       = {Anupam Das and
                  Mohammad Mahfuzul Islam},
  title        = {SecuredTrust: {A} Dynamic Trust Computation Model for Secured Communication
                  in Multiagent Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {2},
  pages        = {261--274},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.57},
  doi          = {10.1109/TDSC.2011.57},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DasI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DimitrakakisKM12,
  author       = {Christos Dimitrakakis and
                  Tom Karygiannis and
                  Aikaterini Mitrokotsa},
  title        = {Guest Editors' Introduction: Special Section on Learning, Games, and
                  Security},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {449--450},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.45},
  doi          = {10.1109/TDSC.2012.45},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DimitrakakisKM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DolevH12,
  author       = {Shlomi Dolev and
                  Yinnon A. Haviv},
  title        = {Stabilization Enabling Technology},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {2},
  pages        = {275--288},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.60},
  doi          = {10.1109/TDSC.2011.60},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DolevH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DongCNY12,
  author       = {Jing Dong and
                  Reza Curtmola and
                  Cristina Nita{-}Rotaru and
                  David K. Y. Yau},
  title        = {Pollution Attacks and Defenses in Wireless Interflow Network Coding
                  Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {5},
  pages        = {741--755},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.39},
  doi          = {10.1109/TDSC.2012.39},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DongCNY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DuanCSDSB12,
  author       = {Zhenhai Duan and
                  Peng Chen and
                  Fernando Sanchez and
                  Yingfei Dong and
                  Mary Stephenson and
                  James Michael Barker},
  title        = {Detecting Spam Zombies by Monitoring Outgoing Messages},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {2},
  pages        = {198--210},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.49},
  doi          = {10.1109/TDSC.2011.49},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DuanCSDSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FerrariT12,
  author       = {Elena Ferrari and
                  Bhavani Thuraisingham},
  title        = {Guest Editors' Introduction: Special Section on Data and Applications
                  Security and Privacy},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {5},
  pages        = {625--626},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.58},
  doi          = {10.1109/TDSC.2012.58},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/FerrariT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FuPT12,
  author       = {Zhang Fu and
                  Marina Papatriantafilou and
                  Philippas Tsigas},
  title        = {Mitigating Distributed Denial of Service Attacks in Multiparty Applications
                  in the Presence of Clock Drifts},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {3},
  pages        = {401--413},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.18},
  doi          = {10.1109/TDSC.2012.18},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/FuPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HarelSRE12,
  author       = {Amir Harel and
                  Asaf Shabtai and
                  Lior Rokach and
                  Yuval Elovici},
  title        = {M-Score: {A} Misuseability Weight Measure},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {3},
  pages        = {414--428},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.17},
  doi          = {10.1109/TDSC.2012.17},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HarelSRE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HerranzNS12,
  author       = {Javier Herranz and
                  Jordi Nin and
                  Marc Sol{\'{e}}},
  title        = {More Hybrid and Secure Protection of Statistical Data Sets},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {5},
  pages        = {727--740},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.40},
  doi          = {10.1109/TDSC.2012.40},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HerranzNS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HoWD12,
  author       = {Jun{-}Won Ho and
                  Matthew K. Wright and
                  Sajal K. Das},
  title        = {ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation
                  in Wireless Sensor Networks Using Sequential Hypothesis Testing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {494--511},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.65},
  doi          = {10.1109/TDSC.2011.65},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HoWD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HolmEA12,
  author       = {Hannes Holm and
                  Mathias Ekstedt and
                  Dennis Andersson},
  title        = {Empirical Analysis of System-Level Vulnerability Metrics through Actual
                  Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {6},
  pages        = {825--837},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.66},
  doi          = {10.1109/TDSC.2012.66},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HolmEA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HuAK12,
  author       = {Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Ketan Kulkarni},
  title        = {Detecting and Resolving Firewall Policy Anomalies},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {3},
  pages        = {318--331},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.20},
  doi          = {10.1109/TDSC.2012.20},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HuAK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/IdikaB12,
  author       = {Nwokedi C. Idika and
                  Bharat K. Bhargava},
  title        = {Extending Attack Graph-Based Security Metrics and Aggregating Their
                  Application},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {1},
  pages        = {75--85},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2010.61},
  doi          = {10.1109/TDSC.2010.61},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/IdikaB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/InanKGB12,
  author       = {Ali Inan and
                  Murat Kantarcioglu and
                  Gabriel Ghinita and
                  Elisa Bertino},
  title        = {A Hybrid Approach to Private Record Matching},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {5},
  pages        = {684--698},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.46},
  doi          = {10.1109/TDSC.2012.46},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/InanKGB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JacksonC12,
  author       = {Jennifer T. Jackson and
                  Sadie Creese},
  title        = {Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviors},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {6},
  pages        = {930--943},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.72},
  doi          = {10.1109/TDSC.2012.72},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JacksonC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JefferyF12,
  author       = {Casey M. Jeffery and
                  Renato J. O. Figueiredo},
  title        = {A Flexible Approach to Improving System Reliability with Virtual Lockstep},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {1},
  pages        = {2--15},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2010.53},
  doi          = {10.1109/TDSC.2010.53},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JefferyF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KirkpatrickGB12,
  author       = {Michael S. Kirkpatrick and
                  Gabriel Ghinita and
                  Elisa Bertino},
  title        = {Resilient Authenticated Execution of Critical Applications in Untrusted
                  Environments},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {597--609},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.25},
  doi          = {10.1109/TDSC.2012.25},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/KirkpatrickGB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KirkpatrickGB12a,
  author       = {Michael S. Kirkpatrick and
                  Gabriel Ghinita and
                  Elisa Bertino},
  title        = {Privacy-Preserving Enforcement of Spatially Aware {RBAC}},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {5},
  pages        = {627--640},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.62},
  doi          = {10.1109/TDSC.2011.62},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/KirkpatrickGB12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LeSK12,
  author       = {Meixing Le and
                  Angelos Stavrou and
                  Brent ByungHoon Kang},
  title        = {DoubleGuard: Detecting Intrusions in Multitier Web Applications},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {512--525},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.59},
  doi          = {10.1109/TDSC.2011.59},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LeSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiLC12,
  author       = {Qiming Li and
                  John C. S. Lui and
                  Dah{-}Ming Chiu},
  title        = {On the Security and Efficiency of Content Distribution via Network
                  Coding},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {2},
  pages        = {211--221},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.32},
  doi          = {10.1109/TDSC.2011.32},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiLC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LimKW12,
  author       = {Hoon Wei Lim and
                  Florian Kerschbaum and
                  Huaxiong Wang},
  title        = {Workflow Signatures for Business Process Compliance},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {5},
  pages        = {756--769},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.38},
  doi          = {10.1109/TDSC.2012.38},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LimKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LuVAH12,
  author       = {Haibing Lu and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Yuan Hong},
  title        = {Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {5},
  pages        = {655--669},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.21},
  doi          = {10.1109/TDSC.2012.21},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LuVAH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LuoCZC12,
  author       = {Xiapu Luo and
                  Edmond W. W. Chan and
                  Peng Zhou and
                  Rocky K. C. Chang},
  title        = {Robust Network Covert Communications Based on {TCP} and Enumerative
                  Combinatorics},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {6},
  pages        = {890--902},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.64},
  doi          = {10.1109/TDSC.2012.64},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LuoCZC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Martinez-AlvarezCRPGA12,
  author       = {Antonio Mart{\'{\i}}nez{-}{\'{A}}lvarez and
                  Sergio Cuenca{-}Asensi and
                  Felipe Restrepo{-}Calle and
                  Francisco R. Palomo and
                  Hip{\'{o}}lito Guzm{\'{a}}n{-}Miranda and
                  Miguel A. Aguirre},
  title        = {Compiler-Directed Soft Error Mitigation for Embedded Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {2},
  pages        = {159--172},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.54},
  doi          = {10.1109/TDSC.2011.54},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Martinez-AlvarezCRPGA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MasoumzadehJ12,
  author       = {Amirreza Masoumzadeh and
                  James Joshi},
  title        = {Preserving Structural Properties in Edge-Perturbing Anonymization
                  Techniques for Social Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {6},
  pages        = {877--889},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.65},
  doi          = {10.1109/TDSC.2012.65},
  timestamp    = {Fri, 08 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MasoumzadehJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MeiS12,
  author       = {Alessandro Mei and
                  Julinda Stefa},
  title        = {Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish
                  Individuals},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {569--582},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.37},
  doi          = {10.1109/TDSC.2012.37},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MeiS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MerentitisKPG12,
  author       = {Andreas Merentitis and
                  Nektarios Kranitis and
                  Antonis M. Paschalis and
                  Dimitris Gizopoulos},
  title        = {Low Energy Online Self-Test of Embedded Processors in Dependable {WSN}
                  Nodes},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {1},
  pages        = {86--100},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.17},
  doi          = {10.1109/TDSC.2011.17},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/MerentitisKPG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MustafaZLXP12,
  author       = {Hossen Asiful Mustafa and
                  Xin Zhang and
                  Zhenhua Liu and
                  Wenyuan Xu and
                  Adrian Perrig},
  title        = {Jamming-Resilient Multipath Routing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {6},
  pages        = {852--864},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.69},
  doi          = {10.1109/TDSC.2012.69},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MustafaZLXP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NixK12,
  author       = {Robert Nix and
                  Murat Kantarcioglu},
  title        = {Incentive Compatible Privacy-Preserving Distributed Classification},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {451--462},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.52},
  doi          = {10.1109/TDSC.2011.52},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/NixK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PapadopoulosBP12,
  author       = {Stavros Papadopoulos and
                  Spiridon Bakiras and
                  Dimitris Papadias},
  title        = {pCloud: {A} Distributed System for Practical {PIR}},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {1},
  pages        = {115--127},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2010.60},
  doi          = {10.1109/TDSC.2010.60},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/PapadopoulosBP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PathakR12,
  author       = {Manas A. Pathak and
                  Bhiksha Raj},
  title        = {Large Margin Gaussian Mixture Models with Differential Privacy},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {463--469},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.27},
  doi          = {10.1109/TDSC.2012.27},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/PathakR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PerdisciCG12,
  author       = {Roberto Perdisci and
                  Igino Corona and
                  Giorgio Giacinto},
  title        = {Early Detection of Malicious Flux Networks via Large-Scale Passive
                  {DNS} Traffic Analysis},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {5},
  pages        = {714--726},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.35},
  doi          = {10.1109/TDSC.2012.35},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/PerdisciCG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PoolsappasitDR12,
  author       = {Nayot Poolsappasit and
                  Rinku Dewri and
                  Indrajit Ray},
  title        = {Dynamic Security Risk Management Using Bayesian Attack Graphs},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {1},
  pages        = {61--74},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.34},
  doi          = {10.1109/TDSC.2011.34},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/PoolsappasitDR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ProanoL12,
  author       = {Alejandro Proa{\~{n}}o and
                  Loukas Lazos},
  title        = {Packet-Hiding Methods for Preventing Selective Jamming Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {1},
  pages        = {101--114},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.41},
  doi          = {10.1109/TDSC.2011.41},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ProanoL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Rebollo-MonederoFD12,
  author       = {David Rebollo{-}Monedero and
                  Jordi Forn{\'{e}} and
                  Josep Domingo{-}Ferrer},
  title        = {Query Profile Obfuscation by Means of Optimal Query Exchange between
                  Users},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {5},
  pages        = {641--654},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.16},
  doi          = {10.1109/TDSC.2012.16},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/Rebollo-MonederoFD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RiboniPB12,
  author       = {Daniele Riboni and
                  Linda Pareschi and
                  Claudio Bettini},
  title        = {JS-Reduce: Defending Your Data from Sequential Background Knowledge
                  Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {3},
  pages        = {387--400},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.19},
  doi          = {10.1109/TDSC.2012.19},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/RiboniPB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RodriguesLCLS12,
  author       = {Rodrigo Rodrigues and
                  Barbara Liskov and
                  Kathryn Chen and
                  Moses D. Liskov and
                  David A. Schultz},
  title        = {Automatic Reconfiguration for Large-Scale Reliable Storage Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {2},
  pages        = {145--158},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2010.52},
  doi          = {10.1109/TDSC.2010.52},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/RodriguesLCLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RuanYAYQ12,
  author       = {Xiaojun Ruan and
                  Qing Yang and
                  Mohammed I. Alghamdi and
                  Shu Yin and
                  Xiao Qin},
  title        = {{ES-MPICH2:} {A} Message Passing Interface with Enhanced Security},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {3},
  pages        = {361--374},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.9},
  doi          = {10.1109/TDSC.2012.9},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/RuanYAYQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Sandhu12,
  author       = {Ravi S. Sandhu},
  title        = {Editorial},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {1},
  pages        = {1},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.7},
  doi          = {10.1109/TDSC.2012.7},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Sandhu12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Shan0C12,
  author       = {Zhiyong Shan and
                  Xin Wang and
                  Tzi{-}cker Chiueh},
  title        = {Enforcing Mandatory Access Control in Commodity {OS} to Disable Malware},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {541--555},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.36},
  doi          = {10.1109/TDSC.2012.36},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Shan0C12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShehabM12,
  author       = {Mohamed Shehab and
                  Said Marouf},
  title        = {Recommendation Models for Open Authorization},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {583--596},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.34},
  doi          = {10.1109/TDSC.2012.34},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ShehabM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SquicciariniBTB12,
  author       = {Anna Cinzia Squicciarini and
                  Elisa Bertino and
                  Alberto Trombetta and
                  Stefano Braghin},
  title        = {A Flexible Approach to Multisession Trust Negotiations},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {1},
  pages        = {16--29},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.31},
  doi          = {10.1109/TDSC.2011.31},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SquicciariniBTB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SunLD12,
  author       = {Yan Sun and
                  Hong Luo and
                  Sajal K. Das},
  title        = {A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless
                  Multimedia Sensor Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {6},
  pages        = {785--797},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.68},
  doi          = {10.1109/TDSC.2012.68},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SunLD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SundareswaranSL12,
  author       = {Smitha Sundareswaran and
                  Anna Cinzia Squicciarini and
                  Dan Lin},
  title        = {Ensuring Distributed Accountability for Data Sharing in the Cloud},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {556--568},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.26},
  doi          = {10.1109/TDSC.2012.26},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SundareswaranSL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TangLLP12,
  author       = {Yang Tang and
                  Patrick P. C. Lee and
                  John C. S. Lui and
                  Radia J. Perlman},
  title        = {Secure Overlay Cloud Storage with Access Control and Assured Deletion},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {6},
  pages        = {903--916},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.49},
  doi          = {10.1109/TDSC.2012.49},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/TangLLP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangZ12,
  author       = {Huaqun Wang and
                  Yuqing Zhang},
  title        = {On the Security of a Ticket-Based Anonymity System with Traceability
                  Property in Wireless Mesh Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {3},
  pages        = {443--446},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.53},
  doi          = {10.1109/TDSC.2011.53},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WuXW12,
  author       = {Zhenyu Wu and
                  Mengjun Xie and
                  Haining Wang},
  title        = {On Energy Security of Server Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {6},
  pages        = {865--876},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.70},
  doi          = {10.1109/TDSC.2012.70},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WuXW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuLZ12,
  author       = {Shouhuai Xu and
                  Wenlian Lu and
                  Zhenxin Zhan},
  title        = {A Stochastic Model of Multivirus Dynamics},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {1},
  pages        = {30--45},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.33},
  doi          = {10.1109/TDSC.2011.33},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XuLZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuTSTWX12,
  author       = {Dianxiang Xu and
                  Manghui Tu and
                  Michael Sanford and
                  Lijo Thomas and
                  Daniel Woodraska and
                  Weifeng Xu},
  title        = {Automated Security Test Generation with Formal Threat Models},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {526--540},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.24},
  doi          = {10.1109/TDSC.2012.24},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XuTSTWX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuXWSY12,
  author       = {Kui Xu and
                  Huijun Xiong and
                  Chehai Wu and
                  Deian Stefan and
                  Danfeng Yao},
  title        = {Data-Provenance Verification For Secure Hosts},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {2},
  pages        = {173--183},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.50},
  doi          = {10.1109/TDSC.2011.50},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XuXWSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuZHAS12,
  author       = {Wenjuan Xu and
                  Xinwen Zhang and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Jean{-}Pierre Seifert},
  title        = {Remote Attestation with Domain-Based Integrity Model and Policy Analysis},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {3},
  pages        = {429--442},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.61},
  doi          = {10.1109/TDSC.2011.61},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XuZHAS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Yi12,
  author       = {Xun Yi},
  title        = {Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management
                  Scheme for Secure Broadcasting},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {2},
  pages        = {303--304},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2010.42},
  doi          = {10.1109/TDSC.2010.42},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Yi12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhanSD12,
  author       = {Guoxing Zhan and
                  Weisong Shi and
                  Hongmei Julia Deng},
  title        = {Design and Implementation of {TARF:} {A} Trust-Aware Routing Framework
                  for WSNs},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {2},
  pages        = {184--197},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.58},
  doi          = {10.1109/TDSC.2011.58},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhanSD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhaoHAW12,
  author       = {Ziming Zhao and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Ruoyu Wu},
  title        = {Risk-Aware Mitigation for {MANET} Routing Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {2},
  pages        = {250--260},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.51},
  doi          = {10.1109/TDSC.2011.51},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhaoHAW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhuLV12,
  author       = {Ye Zhu and
                  Yuanchao Lu and
                  Anil Vikram},
  title        = {On Privacy of Encrypted Speech Communications},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {470--481},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.56},
  doi          = {10.1109/TDSC.2011.56},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhuLV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Zuo12,
  author       = {Yanjun Zuo},
  title        = {Survivability Experiment and Attack Characterization for {RFID}},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {2},
  pages        = {289--302},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.30},
  doi          = {10.1109/TDSC.2011.30},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Zuo12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics