default search action
Search dblp for Publications
export results for "toc:db/journals/tdsc/tdsc3.bht:"
@article{DBLP:journals/tdsc/ArlatBHV06, author = {Jean Arlat and Andrea Bondavalli and Boudewijn R. Haverkort and Paulo Ver{\'{\i}}ssimo}, title = {Guest Editorial for the Special Issue on the 2005 {IEEE/IFIP} Conference on Dependable Systems and Networks, including the Dependable Computing and Communications and Performance and Dependability Symposia}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {3}, pages = {169--171}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.36}, doi = {10.1109/TDSC.2006.36}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ArlatBHV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BadishiKS06, author = {Gal Badishi and Idit Keidar and Amir Sasson}, title = {Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based Multicast}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {1}, pages = {45--61}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.12}, doi = {10.1109/TDSC.2006.12}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BadishiKS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BakerP06, author = {Zachary K. Baker and Viktor K. Prasanna}, title = {Automatic Synthesis of Efficient Intrusion Detection Systems on FPGAs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {289--300}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.44}, doi = {10.1109/TDSC.2006.44}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BakerP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CiaramellaDSGT06, author = {Angelo Ciaramella and Paolo D'Arco and Alfredo De Santis and Clemente Galdi and Roberto Tagliaferri}, title = {Neural Network Techniques for Proactive Password Checking}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {327--339}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.53}, doi = {10.1109/TDSC.2006.53}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CiaramellaDSGT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DuDHV06, author = {Wenliang Du and Jing Deng and Yunghsiang S. Han and Pramod K. Varshney}, title = {A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {1}, pages = {62--77}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.2}, doi = {10.1109/TDSC.2006.2}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DuDHV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FuWD06, author = {Anthony Y. Fu and Liu Wenyin and Xiaotie Deng}, title = {Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance {(EMD)}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {301--311}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.50}, doi = {10.1109/TDSC.2006.50}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FuWD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HanWJ06, author = {Junghee Han and David Watson and Farnam Jahanian}, title = {An Experimental Study of Internet Path Diversity}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {273--288}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.43}, doi = {10.1109/TDSC.2006.43}, timestamp = {Sat, 18 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/HanWJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Iyer06, author = {Ravishankar K. Iyer}, title = {Editorial: Dependability and Security--Looking Foward to 2006}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {1}, pages = {1}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.11}, doi = {10.1109/TDSC.2006.11}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Iyer06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JiangCY06, author = {Guofei Jiang and Haifeng Chen and Kenji Yoshihira}, title = {Modeling and Tracking of Transaction Flow Dynamics for Fault Detection in Complex Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {312--326}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.52}, doi = {10.1109/TDSC.2006.52}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JiangCY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KemperMT06, author = {Peter Kemper and Dennis M{\"{u}}ller and Axel Th{\"{u}}mmler}, title = {Combining Response Surface Methodology with Numerical Methods for Optimization of Markovian Models}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {3}, pages = {259--269}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.28}, doi = {10.1109/TDSC.2006.28}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KemperMT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KhannaVB06, author = {Gunjan Khanna and Padma Varadharajan and Saurabh Bagchi}, title = {Automated Online Monitoring of Distributed Applications through External Monitors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {2}, pages = {115--129}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.17}, doi = {10.1109/TDSC.2006.17}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KhannaVB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KimLCC06, author = {Yoohwan Kim and Wing Cheong Lau and Mooi Choo Chuah and H. Jonathan Chao}, title = {PacketScore: {A} Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {2}, pages = {141--155}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.25}, doi = {10.1109/TDSC.2006.25}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KimLCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiL06, author = {Jiangtao Li and Ninghui Li}, title = {OACerts: Oblivious Attribute Certificates}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {340--352}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.54}, doi = {10.1109/TDSC.2006.54}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MartinA06, author = {Jean{-}Philippe Martin and Lorenzo Alvisi}, title = {Fast Byzantine Consensus}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {3}, pages = {202--215}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.35}, doi = {10.1109/TDSC.2006.35}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MartinA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MartinA06a, author = {Jean{-}Philippe Martin and Lorenzo Alvisi}, title = {Correction to "Fast Byzantine Consensus"}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {400}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.45}, doi = {10.1109/TDSC.2006.45}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MartinA06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MizrakCMS06, author = {Alper Tugay Mizrak and Yuchung Cheng and Keith Marzullo and Stefan Savage}, title = {Detecting and Isolating Malicious Routers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {3}, pages = {230--244}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.34}, doi = {10.1109/TDSC.2006.34}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MizrakCMS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NebenzahlSW06, author = {Danny Nebenzahl and Shmuel Sagiv and Avishai Wool}, title = {Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {1}, pages = {78--90}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.14}, doi = {10.1109/TDSC.2006.14}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/NebenzahlSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/OzakiDOK06, author = {Tatsuya Ozaki and Tadashi Dohi and Hiroyuki Okamura and Naoto Kaio}, title = {Distribution-Free Checkpoint Placement Algorithms Based on Min-Max Principle}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {2}, pages = {130--140}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.22}, doi = {10.1109/TDSC.2006.22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/OzakiDOK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PereiraMC06, author = {Anil L. Pereira and Vineela Muppavarapu and Soon Myoung Chung}, title = {Role-Based Access Control for Grid Database Services Using the Community Authorization Service}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {2}, pages = {156--166}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.26}, doi = {10.1109/TDSC.2006.26}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PereiraMC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PiromsopaE06, author = {Krerk Piromsopa and Richard J. Enbody}, title = {Secure Bit: Transparent, Hardware Buffer-Overflow Protection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {365--376}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.56}, doi = {10.1109/TDSC.2006.56}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/PiromsopaE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RajagopalanHJS06, author = {Mohan Rajagopalan and Matti A. Hiltunen and Trevor Jim and Richard D. Schlichting}, title = {System Call Monitoring Using Authenticated System Calls}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {3}, pages = {216--229}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.41}, doi = {10.1109/TDSC.2006.41}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RajagopalanHJS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SchiperT06, author = {Andr{\'{e}} Schiper and Sam Toueg}, title = {From Set Membership to Group Membership: {A} Separation of Concerns}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {1}, pages = {2--12}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.13}, doi = {10.1109/TDSC.2006.13}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SchiperT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SquicciariniBFR06, author = {Anna Cinzia Squicciarini and Elisa Bertino and Elena Ferrari and Indrakshi Ray}, title = {Achieving Privacy in Trust Negotiations with an Ontology-Based Approach}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {1}, pages = {13--30}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.3}, doi = {10.1109/TDSC.2006.3}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SquicciariniBFR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SridharanATK06, author = {Vilas Sridharan and Hossein Asadi and Mehdi Baradaran Tahoori and David R. Kaeli}, title = {Reducing Data Cache Susceptibility to Soft Errors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {353--364}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.55}, doi = {10.1109/TDSC.2006.55}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SridharanATK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/StrunkK06, author = {Elisabeth A. Strunk and John C. Knight}, title = {Dependability through Assured Reconfiguration in Embedded System Software}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {3}, pages = {172--187}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.33}, doi = {10.1109/TDSC.2006.33}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/StrunkK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ThummlerBT06, author = {Axel Th{\"{u}}mmler and Peter Buchholz and Mikl{\'{o}}s Telek}, title = {A Novel Approach for Phase-Type Fitting with the {EM} Algorithm}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {3}, pages = {245--258}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.27}, doi = {10.1109/TDSC.2006.27}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ThummlerBT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/VoraN06, author = {Adnan Vora and Mikhail Nesterenko}, title = {Secure Location Verification Using Radio Broadcast}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {377--385}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.57}, doi = {10.1109/TDSC.2006.57}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/VoraN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangL06, author = {Shyh{-}Yih Wang and Chi{-}Sung Laih}, title = {Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {1}, pages = {91--100}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.15}, doi = {10.1109/TDSC.2006.15}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangP06, author = {Nicholas J. Wang and Sanjay J. Patel}, title = {ReStore: Symptom-Based Soft Error Detection in Microprocessors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {3}, pages = {188--201}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.40}, doi = {10.1109/TDSC.2006.40}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XinidisCAAM06, author = {Konstantinos Xinidis and Ioannis Charitakis and Spyros Antonatos and Kostas G. Anagnostakis and Evangelos P. Markatos}, title = {An Active Splitter Architecture for Intrusion Detection and Prevention}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {1}, pages = {31--44}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.6}, doi = {10.1109/TDSC.2006.6}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XinidisCAAM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YangDB06, author = {Yanjiang Yang and Robert H. Deng and Feng Bao}, title = {A Practical Password-Based Two-Server Authentication and Key Exchange System}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {2}, pages = {105--114}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.16}, doi = {10.1109/TDSC.2006.16}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YangDB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangLLF06, author = {Yanchao Zhang and Wei Liu and Wenjing Lou and Yuguang Fang}, title = {Securing Mobile Ad Hoc Networks with Certificateless Public Keys}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {386--399}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.58}, doi = {10.1109/TDSC.2006.58}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangLLF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.