Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/tdsc/tdsc9.bht:"
@article{DBLP:journals/tdsc/AlsalehMO12, author = {Mansour Alsaleh and Mohammad Mannan and Paul C. van Oorschot}, title = {Revisiting Defenses against Large-Scale Online Password Guessing Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {128--141}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.24}, doi = {10.1109/TDSC.2011.24}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AlsalehMO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AydayF12, author = {Erman Ayday and Faramarz Fekri}, title = {Iterative Trust and Reputation Management Using Belief Propagation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {375--386}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.64}, doi = {10.1109/TDSC.2011.64}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AydayF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BarkerG12, author = {Steve Barker and Valerio Genovese}, title = {Access Control with Privacy Enhancements a Unified Approach}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {670--683}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.22}, doi = {10.1109/TDSC.2012.22}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BarkerG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BarthRSMSB12, author = {Adam Barth and Benjamin I. P. Rubinstein and Mukund Sundararajan and John C. Mitchell and Dawn Song and Peter L. Bartlett}, title = {A Learning-Based Approach to Reactive Security}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {482--493}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.42}, doi = {10.1109/TDSC.2011.42}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BarthRSMSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BishopEHW12, author = {Matt Bishop and Sophie Engle and Damien Howard and Sean Whalen}, title = {A Taxonomy of Buffer Overflow Characteristics}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {305--317}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.10}, doi = {10.1109/TDSC.2012.10}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BishopEHW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BorranHSS12, author = {Fatemeh Borran and Martin Hutle and Nuno Santos and Andr{\'{e}} Schiper}, title = {Quantitative Analysis of Consensus Algorithms}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {236--249}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.48}, doi = {10.1109/TDSC.2011.48}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BorranHSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BrickellL12, author = {Ernie Brickell and Jiangtao Li}, title = {Enhanced Privacy {ID:} {A} Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {345--360}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.63}, doi = {10.1109/TDSC.2011.63}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BrickellL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Chandrasekhar0S12, author = {Santosh Chandrasekhar and Saikat Chakrabarti and Mukesh Singhal}, title = {A Trapdoor Hash-Based Mechanism for Stream Authentication}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {699--713}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.48}, doi = {10.1109/TDSC.2012.48}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Chandrasekhar0S12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChangH12, author = {Nai{-}Wen Chang and Sun{-}Yuan Hsieh}, title = {Conditional Diagnosability of Augmented Cubes under the {PMC} Model}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {46--60}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2010.59}, doi = {10.1109/TDSC.2010.59}, timestamp = {Mon, 29 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChangH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChasakiW12, author = {Danai Chasaki and Tilman Wolf}, title = {Attacks and Defenses in the Data Plane of Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {798--810}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.50}, doi = {10.1109/TDSC.2012.50}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChasakiW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenLWH12, author = {Xiaodao Chen and Chen Liao and Tongquan Wei and Shiyan Hu}, title = {An Interconnect Reliability-Driven Routing Technique for Electromigration Failure Avoidance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {770--776}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2010.57}, doi = {10.1109/TDSC.2010.57}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChenLWH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenNM12, author = {You Chen and Steve Nyemba and Bradley A. Malin}, title = {Detecting Anomalous Insiders in Collaborative Information Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {332--344}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.11}, doi = {10.1109/TDSC.2012.11}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChenNM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChiassonSFBO12, author = {Sonia Chiasson and Elizabeth Stobert and Alain Forget and Robert Biddle and Paul C. van Oorschot}, title = {Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {222--235}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.55}, doi = {10.1109/TDSC.2011.55}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChiassonSFBO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChuGWJ12, author = {Zi Chu and Steven Gianvecchio and Haining Wang and Sushil Jajodia}, title = {Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {811--824}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.75}, doi = {10.1109/TDSC.2012.75}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChuGWJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CortinasFGLLPA12, author = {Roberto Corti{\~{n}}as and Felix C. Freiling and Marjan Ghajar{-}Azadanlou and Alberto Lafuente and Mikel Larrea and Lucia Draque Penso and Iratxe Soraluze Arriola}, title = {Secure Failure Detection and Consensus in TrustedPals}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {610--625}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.23}, doi = {10.1109/TDSC.2012.23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CortinasFGLLPA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CucurullANS12, author = {Jordi Cucurull and Mikael Asplund and Simin Nadjm{-}Tehrani and Tiziano Santoro}, title = {Surviving Attacks in Challenged Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {917--929}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.67}, doi = {10.1109/TDSC.2012.67}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CucurullANS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DaiPJX12, author = {Weiqi Dai and T. Paul Parker and Hai Jin and Shouhuai Xu}, title = {Enhancing Data Trustworthiness via Assured Digital Signing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {838--851}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.71}, doi = {10.1109/TDSC.2012.71}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DaiPJX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DasI12, author = {Anupam Das and Mohammad Mahfuzul Islam}, title = {SecuredTrust: {A} Dynamic Trust Computation Model for Secured Communication in Multiagent Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {261--274}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.57}, doi = {10.1109/TDSC.2011.57}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DasI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DimitrakakisKM12, author = {Christos Dimitrakakis and Tom Karygiannis and Aikaterini Mitrokotsa}, title = {Guest Editors' Introduction: Special Section on Learning, Games, and Security}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {449--450}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.45}, doi = {10.1109/TDSC.2012.45}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DimitrakakisKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DolevH12, author = {Shlomi Dolev and Yinnon A. Haviv}, title = {Stabilization Enabling Technology}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {275--288}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.60}, doi = {10.1109/TDSC.2011.60}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DolevH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DongCNY12, author = {Jing Dong and Reza Curtmola and Cristina Nita{-}Rotaru and David K. Y. Yau}, title = {Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {741--755}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.39}, doi = {10.1109/TDSC.2012.39}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DongCNY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DuanCSDSB12, author = {Zhenhai Duan and Peng Chen and Fernando Sanchez and Yingfei Dong and Mary Stephenson and James Michael Barker}, title = {Detecting Spam Zombies by Monitoring Outgoing Messages}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {198--210}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.49}, doi = {10.1109/TDSC.2011.49}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DuanCSDSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FerrariT12, author = {Elena Ferrari and Bhavani Thuraisingham}, title = {Guest Editors' Introduction: Special Section on Data and Applications Security and Privacy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {625--626}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.58}, doi = {10.1109/TDSC.2012.58}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FerrariT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FuPT12, author = {Zhang Fu and Marina Papatriantafilou and Philippas Tsigas}, title = {Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {401--413}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.18}, doi = {10.1109/TDSC.2012.18}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FuPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HarelSRE12, author = {Amir Harel and Asaf Shabtai and Lior Rokach and Yuval Elovici}, title = {M-Score: {A} Misuseability Weight Measure}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {414--428}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.17}, doi = {10.1109/TDSC.2012.17}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HarelSRE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HerranzNS12, author = {Javier Herranz and Jordi Nin and Marc Sol{\'{e}}}, title = {More Hybrid and Secure Protection of Statistical Data Sets}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {727--740}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.40}, doi = {10.1109/TDSC.2012.40}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HerranzNS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HoWD12, author = {Jun{-}Won Ho and Matthew K. Wright and Sajal K. Das}, title = {ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {494--511}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.65}, doi = {10.1109/TDSC.2011.65}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HoWD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HolmEA12, author = {Hannes Holm and Mathias Ekstedt and Dennis Andersson}, title = {Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {825--837}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.66}, doi = {10.1109/TDSC.2012.66}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HolmEA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HuAK12, author = {Hongxin Hu and Gail{-}Joon Ahn and Ketan Kulkarni}, title = {Detecting and Resolving Firewall Policy Anomalies}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {318--331}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.20}, doi = {10.1109/TDSC.2012.20}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HuAK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/IdikaB12, author = {Nwokedi C. Idika and Bharat K. Bhargava}, title = {Extending Attack Graph-Based Security Metrics and Aggregating Their Application}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {75--85}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2010.61}, doi = {10.1109/TDSC.2010.61}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/IdikaB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/InanKGB12, author = {Ali Inan and Murat Kantarcioglu and Gabriel Ghinita and Elisa Bertino}, title = {A Hybrid Approach to Private Record Matching}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {684--698}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.46}, doi = {10.1109/TDSC.2012.46}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/InanKGB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JacksonC12, author = {Jennifer T. Jackson and Sadie Creese}, title = {Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {930--943}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.72}, doi = {10.1109/TDSC.2012.72}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JacksonC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JefferyF12, author = {Casey M. Jeffery and Renato J. O. Figueiredo}, title = {A Flexible Approach to Improving System Reliability with Virtual Lockstep}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {2--15}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2010.53}, doi = {10.1109/TDSC.2010.53}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JefferyF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KirkpatrickGB12, author = {Michael S. Kirkpatrick and Gabriel Ghinita and Elisa Bertino}, title = {Resilient Authenticated Execution of Critical Applications in Untrusted Environments}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {597--609}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.25}, doi = {10.1109/TDSC.2012.25}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KirkpatrickGB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KirkpatrickGB12a, author = {Michael S. Kirkpatrick and Gabriel Ghinita and Elisa Bertino}, title = {Privacy-Preserving Enforcement of Spatially Aware {RBAC}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {627--640}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.62}, doi = {10.1109/TDSC.2011.62}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KirkpatrickGB12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LeSK12, author = {Meixing Le and Angelos Stavrou and Brent ByungHoon Kang}, title = {DoubleGuard: Detecting Intrusions in Multitier Web Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {512--525}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.59}, doi = {10.1109/TDSC.2011.59}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LeSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiLC12, author = {Qiming Li and John C. S. Lui and Dah{-}Ming Chiu}, title = {On the Security and Efficiency of Content Distribution via Network Coding}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {211--221}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.32}, doi = {10.1109/TDSC.2011.32}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiLC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LimKW12, author = {Hoon Wei Lim and Florian Kerschbaum and Huaxiong Wang}, title = {Workflow Signatures for Business Process Compliance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {756--769}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.38}, doi = {10.1109/TDSC.2012.38}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LimKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LuVAH12, author = {Haibing Lu and Jaideep Vaidya and Vijayalakshmi Atluri and Yuan Hong}, title = {Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {655--669}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.21}, doi = {10.1109/TDSC.2012.21}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LuVAH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LuoCZC12, author = {Xiapu Luo and Edmond W. W. Chan and Peng Zhou and Rocky K. C. Chang}, title = {Robust Network Covert Communications Based on {TCP} and Enumerative Combinatorics}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {890--902}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.64}, doi = {10.1109/TDSC.2012.64}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LuoCZC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Martinez-AlvarezCRPGA12, author = {Antonio Mart{\'{\i}}nez{-}{\'{A}}lvarez and Sergio Cuenca{-}Asensi and Felipe Restrepo{-}Calle and Francisco R. Palomo and Hip{\'{o}}lito Guzm{\'{a}}n{-}Miranda and Miguel A. Aguirre}, title = {Compiler-Directed Soft Error Mitigation for Embedded Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {159--172}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.54}, doi = {10.1109/TDSC.2011.54}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Martinez-AlvarezCRPGA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MasoumzadehJ12, author = {Amirreza Masoumzadeh and James Joshi}, title = {Preserving Structural Properties in Edge-Perturbing Anonymization Techniques for Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {877--889}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.65}, doi = {10.1109/TDSC.2012.65}, timestamp = {Fri, 08 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MasoumzadehJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MeiS12, author = {Alessandro Mei and Julinda Stefa}, title = {Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {569--582}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.37}, doi = {10.1109/TDSC.2012.37}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MeiS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MerentitisKPG12, author = {Andreas Merentitis and Nektarios Kranitis and Antonis M. Paschalis and Dimitris Gizopoulos}, title = {Low Energy Online Self-Test of Embedded Processors in Dependable {WSN} Nodes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {86--100}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.17}, doi = {10.1109/TDSC.2011.17}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/MerentitisKPG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MustafaZLXP12, author = {Hossen Asiful Mustafa and Xin Zhang and Zhenhua Liu and Wenyuan Xu and Adrian Perrig}, title = {Jamming-Resilient Multipath Routing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {852--864}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.69}, doi = {10.1109/TDSC.2012.69}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MustafaZLXP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NixK12, author = {Robert Nix and Murat Kantarcioglu}, title = {Incentive Compatible Privacy-Preserving Distributed Classification}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {451--462}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.52}, doi = {10.1109/TDSC.2011.52}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/NixK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PapadopoulosBP12, author = {Stavros Papadopoulos and Spiridon Bakiras and Dimitris Papadias}, title = {pCloud: {A} Distributed System for Practical {PIR}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {115--127}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2010.60}, doi = {10.1109/TDSC.2010.60}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PapadopoulosBP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PathakR12, author = {Manas A. Pathak and Bhiksha Raj}, title = {Large Margin Gaussian Mixture Models with Differential Privacy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {463--469}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.27}, doi = {10.1109/TDSC.2012.27}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PathakR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PerdisciCG12, author = {Roberto Perdisci and Igino Corona and Giorgio Giacinto}, title = {Early Detection of Malicious Flux Networks via Large-Scale Passive {DNS} Traffic Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {714--726}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.35}, doi = {10.1109/TDSC.2012.35}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PerdisciCG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PoolsappasitDR12, author = {Nayot Poolsappasit and Rinku Dewri and Indrajit Ray}, title = {Dynamic Security Risk Management Using Bayesian Attack Graphs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {61--74}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.34}, doi = {10.1109/TDSC.2011.34}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PoolsappasitDR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ProanoL12, author = {Alejandro Proa{\~{n}}o and Loukas Lazos}, title = {Packet-Hiding Methods for Preventing Selective Jamming Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {101--114}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.41}, doi = {10.1109/TDSC.2011.41}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ProanoL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Rebollo-MonederoFD12, author = {David Rebollo{-}Monedero and Jordi Forn{\'{e}} and Josep Domingo{-}Ferrer}, title = {Query Profile Obfuscation by Means of Optimal Query Exchange between Users}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {641--654}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.16}, doi = {10.1109/TDSC.2012.16}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/Rebollo-MonederoFD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RiboniPB12, author = {Daniele Riboni and Linda Pareschi and Claudio Bettini}, title = {JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {387--400}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.19}, doi = {10.1109/TDSC.2012.19}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RiboniPB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RodriguesLCLS12, author = {Rodrigo Rodrigues and Barbara Liskov and Kathryn Chen and Moses D. Liskov and David A. Schultz}, title = {Automatic Reconfiguration for Large-Scale Reliable Storage Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {145--158}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2010.52}, doi = {10.1109/TDSC.2010.52}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/RodriguesLCLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RuanYAYQ12, author = {Xiaojun Ruan and Qing Yang and Mohammed I. Alghamdi and Shu Yin and Xiao Qin}, title = {{ES-MPICH2:} {A} Message Passing Interface with Enhanced Security}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {361--374}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.9}, doi = {10.1109/TDSC.2012.9}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/RuanYAYQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Sandhu12, author = {Ravi S. Sandhu}, title = {Editorial}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {1}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.7}, doi = {10.1109/TDSC.2012.7}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Sandhu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Shan0C12, author = {Zhiyong Shan and Xin Wang and Tzi{-}cker Chiueh}, title = {Enforcing Mandatory Access Control in Commodity {OS} to Disable Malware}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {541--555}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.36}, doi = {10.1109/TDSC.2012.36}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Shan0C12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShehabM12, author = {Mohamed Shehab and Said Marouf}, title = {Recommendation Models for Open Authorization}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {583--596}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.34}, doi = {10.1109/TDSC.2012.34}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShehabM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SquicciariniBTB12, author = {Anna Cinzia Squicciarini and Elisa Bertino and Alberto Trombetta and Stefano Braghin}, title = {A Flexible Approach to Multisession Trust Negotiations}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {16--29}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.31}, doi = {10.1109/TDSC.2011.31}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SquicciariniBTB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SunLD12, author = {Yan Sun and Hong Luo and Sajal K. Das}, title = {A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless Multimedia Sensor Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {785--797}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.68}, doi = {10.1109/TDSC.2012.68}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SunLD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SundareswaranSL12, author = {Smitha Sundareswaran and Anna Cinzia Squicciarini and Dan Lin}, title = {Ensuring Distributed Accountability for Data Sharing in the Cloud}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {556--568}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.26}, doi = {10.1109/TDSC.2012.26}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SundareswaranSL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TangLLP12, author = {Yang Tang and Patrick P. C. Lee and John C. S. Lui and Radia J. Perlman}, title = {Secure Overlay Cloud Storage with Access Control and Assured Deletion}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {903--916}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.49}, doi = {10.1109/TDSC.2012.49}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TangLLP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangZ12, author = {Huaqun Wang and Yuqing Zhang}, title = {On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {443--446}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.53}, doi = {10.1109/TDSC.2011.53}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WuXW12, author = {Zhenyu Wu and Mengjun Xie and Haining Wang}, title = {On Energy Security of Server Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {865--876}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.70}, doi = {10.1109/TDSC.2012.70}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WuXW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuLZ12, author = {Shouhuai Xu and Wenlian Lu and Zhenxin Zhan}, title = {A Stochastic Model of Multivirus Dynamics}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {30--45}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.33}, doi = {10.1109/TDSC.2011.33}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuLZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuTSTWX12, author = {Dianxiang Xu and Manghui Tu and Michael Sanford and Lijo Thomas and Daniel Woodraska and Weifeng Xu}, title = {Automated Security Test Generation with Formal Threat Models}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {526--540}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.24}, doi = {10.1109/TDSC.2012.24}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuTSTWX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuXWSY12, author = {Kui Xu and Huijun Xiong and Chehai Wu and Deian Stefan and Danfeng Yao}, title = {Data-Provenance Verification For Secure Hosts}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {173--183}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.50}, doi = {10.1109/TDSC.2011.50}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuXWSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuZHAS12, author = {Wenjuan Xu and Xinwen Zhang and Hongxin Hu and Gail{-}Joon Ahn and Jean{-}Pierre Seifert}, title = {Remote Attestation with Domain-Based Integrity Model and Policy Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {429--442}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.61}, doi = {10.1109/TDSC.2011.61}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuZHAS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Yi12, author = {Xun Yi}, title = {Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {303--304}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2010.42}, doi = {10.1109/TDSC.2010.42}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Yi12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhanSD12, author = {Guoxing Zhan and Weisong Shi and Hongmei Julia Deng}, title = {Design and Implementation of {TARF:} {A} Trust-Aware Routing Framework for WSNs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {184--197}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.58}, doi = {10.1109/TDSC.2011.58}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhanSD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhaoHAW12, author = {Ziming Zhao and Hongxin Hu and Gail{-}Joon Ahn and Ruoyu Wu}, title = {Risk-Aware Mitigation for {MANET} Routing Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {250--260}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.51}, doi = {10.1109/TDSC.2011.51}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhaoHAW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhuLV12, author = {Ye Zhu and Yuanchao Lu and Anil Vikram}, title = {On Privacy of Encrypted Speech Communications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {470--481}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.56}, doi = {10.1109/TDSC.2011.56}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhuLV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Zuo12, author = {Yanjun Zuo}, title = {Survivability Experiment and Attack Characterization for {RFID}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {289--302}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.30}, doi = {10.1109/TDSC.2011.30}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Zuo12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.