Search dblp for Publications

export results for "toc:db/journals/tdsc/tdsc11.bht:"

 download as .bib file

@article{DBLP:journals/tdsc/AlmohriYK14,
  author       = {Hussain M. J. Almohri and
                  Danfeng Yao and
                  Dennis G. Kafura},
  title        = {Process Authentication for High System Assurance},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {2},
  pages        = {168--180},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.29},
  doi          = {10.1109/TDSC.2013.29},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/AlmohriYK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BasilicoGMS14,
  author       = {Nicola Basilico and
                  Nicola Gatti and
                  Mattia Monga and
                  Sabrina Sicari},
  title        = {Security Games for Node Localization through Verifiable Multilateration},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {1},
  pages        = {72--85},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.30},
  doi          = {10.1109/TDSC.2013.30},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BasilicoGMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Bertino14,
  author       = {Elisa Bertino},
  title        = {Editorial},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {1},
  pages        = {1},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2014.3},
  doi          = {10.1109/TDSC.2014.3},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Bertino14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CesareXZ14,
  author       = {Silvio Cesare and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {Control Flow-Based Malware VariantDetection},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {4},
  pages        = {307--317},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.40},
  doi          = {10.1109/TDSC.2013.40},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CesareXZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CheekS14,
  author       = {Gorrell P. Cheek and
                  Mohamed Shehab},
  title        = {Human Effects of Enhanced Privacy Management Models},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {2},
  pages        = {142--154},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.34},
  doi          = {10.1109/TDSC.2013.34},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CheekS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChoLL14,
  author       = {Kwantae Cho and
                  Byung{-}Gil Lee and
                  Dong Hoon Lee},
  title        = {Low-Priced and Energy-Efficient Detection of Replicas for Wireless
                  Sensor Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {5},
  pages        = {454--466},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.41},
  doi          = {10.1109/TDSC.2013.41},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChoLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ColomboF14,
  author       = {Pietro Colombo and
                  Elena Ferrari},
  title        = {Enforcing Obligations within RelationalDatabase Management Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {4},
  pages        = {318--331},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.48},
  doi          = {10.1109/TDSC.2013.48},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ColomboF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FiorinS14,
  author       = {Leandro Fiorin and
                  Mariagiovanna Sami},
  title        = {Fault-Tolerant Network Interfaces for Networks-on-Chip},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {1},
  pages        = {16--29},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.28},
  doi          = {10.1109/TDSC.2013.28},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/FiorinS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FoketSB14,
  author       = {Christophe Foket and
                  Bjorn De Sutter and
                  Koen De Bosschere},
  title        = {Pushing Java Type Obfuscation to the Limit},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {6},
  pages        = {553--567},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2014.2305990},
  doi          = {10.1109/TDSC.2014.2305990},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/FoketSB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FonsecaSVM14,
  author       = {Jos{\'{e}} Fonseca and
                  Nuno Seixas and
                  Marco Vieira and
                  Henrique Madeira},
  title        = {Analysis of Field Data on Web Security Vulnerabilities},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {2},
  pages        = {89--100},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.37},
  doi          = {10.1109/TDSC.2013.37},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/FonsecaSVM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FonsecaVM14,
  author       = {Jos{\'{e}} Fonseca and
                  Marco Vieira and
                  Henrique Madeira},
  title        = {Evaluation of Web Security Mechanisms Using Vulnerability {\&}
                  Attack Injection},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {5},
  pages        = {440--453},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.45},
  doi          = {10.1109/TDSC.2013.45},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/FonsecaVM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GatesCLP14,
  author       = {Christopher S. Gates and
                  Jing Chen and
                  Ninghui Li and
                  Robert W. Proctor},
  title        = {Effective Risk Communication for Android Apps},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {3},
  pages        = {252--265},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.58},
  doi          = {10.1109/TDSC.2013.58},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GatesCLP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GatesLPSQPNM14,
  author       = {Christopher S. Gates and
                  Ninghui Li and
                  Hao Peng and
                  Bhaskar Pratim Sarma and
                  Yuan Qi and
                  Rahul Potharaju and
                  Cristina Nita{-}Rotaru and
                  Ian M. Molloy},
  title        = {Generating Summary Risk Scores for Mobile Applications},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {3},
  pages        = {238--251},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2014.2302293},
  doi          = {10.1109/TDSC.2014.2302293},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/GatesLPSQPNM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuptaSX14,
  author       = {Puneet Gupta and
                  Scott D. Stoller and
                  Zhongyuan Xu},
  title        = {Abductive Analysis of Administrative Policies in Rule-Based Access
                  Control},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {5},
  pages        = {412--424},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.42},
  doi          = {10.1109/TDSC.2013.42},
  timestamp    = {Thu, 28 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GuptaSX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HanLC14,
  author       = {Kyuseung Han and
                  Ganghee Lee and
                  Kiyoung Choi},
  title        = {Software-Level Approaches for Tolerating Transient Faults in a Coarse-GrainedReconfigurable
                  Architecture},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {4},
  pages        = {392--398},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.54},
  doi          = {10.1109/TDSC.2013.54},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HanLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Holm14,
  author       = {Hannes Holm},
  title        = {A Large-Scale Study of the Time Required to Compromise a Computer
                  System},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {1},
  pages        = {2--15},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.21},
  doi          = {10.1109/TDSC.2013.21},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Holm14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HuangQZKX14,
  author       = {Jianzhong Huang and
                  Xiao Qin and
                  Fenghao Zhang and
                  Wei{-}Shinn Ku and
                  Changsheng Xie},
  title        = {{MFTS:} {A} Multi-Level Fault-Tolerant Archiving Storage with Optimized
                  Maintenance Bandwidth},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {6},
  pages        = {524--537},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2014.2304296},
  doi          = {10.1109/TDSC.2014.2304296},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HuangQZKX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Lee14,
  author       = {Younho Lee},
  title        = {Secure Ordered Bucketization},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {3},
  pages        = {292--303},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2014.2313863},
  doi          = {10.1109/TDSC.2014.2313863},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Lee14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiCP14,
  author       = {Qinghua Li and
                  Guohong Cao and
                  Thomas F. La Porta},
  title        = {Efficient and Privacy-Aware Data Aggregation in Mobile Sensing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {2},
  pages        = {115--129},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.31},
  doi          = {10.1109/TDSC.2013.31},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiCP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiWC14,
  author       = {Xin Li and
                  Xinyuan Wang and
                  Wentao Chang},
  title        = {CipherXRay: Exposing Cryptographic Operations and Transient Secrets
                  from Monitored Binary Execution},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {2},
  pages        = {101--114},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2012.83},
  doi          = {10.1109/TDSC.2012.83},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiWC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiberatoreLSL14,
  author       = {Marc Liberatore and
                  Brian Neil Levine and
                  Clay Shields and
                  Brian Lynn},
  title        = {Efficient Tagging of Remote Peers during Child Pornography Investigations},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {5},
  pages        = {425--439},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.46},
  doi          = {10.1109/TDSC.2013.46},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiberatoreLSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuWCRZD14,
  author       = {Wen Ming Liu and
                  Lingyu Wang and
                  Pengsu Cheng and
                  Kui Ren and
                  Shunzhi Zhu and
                  Mourad Debbabi},
  title        = {{PPTP:} Privacy-Preserving Traffic Padding in Web-Based Applications},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {6},
  pages        = {538--552},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2014.2302308},
  doi          = {10.1109/TDSC.2014.2302308},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiuWCRZD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MerloMGPC14,
  author       = {Alessio Merlo and
                  Mauro Migliardi and
                  Nicola Gobbo and
                  Francesco Palmieri and
                  Aniello Castiglione},
  title        = {A Denial of Service Attack to {UMTS} Networks Using SIM-Less Devices},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {3},
  pages        = {280--291},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2014.2315198},
  doi          = {10.1109/TDSC.2014.2315198},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/MerloMGPC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MohammedAFD14,
  author       = {Noman Mohammed and
                  Dima Alhadidi and
                  Benjamin C. M. Fung and
                  Mourad Debbabi},
  title        = {Secure Two-Party Differentially Private Data Release for Vertically
                  Partitioned Data},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {1},
  pages        = {59--71},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.22},
  doi          = {10.1109/TDSC.2013.22},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MohammedAFD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/OthmaneAWB14,
  author       = {Lotfi Ben Othmane and
                  Pelin Angin and
                  Harold Weffers and
                  Bharat K. Bhargava},
  title        = {Extending the Agile Development Process to Develop Acceptably Secure
                  Software},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {6},
  pages        = {497--509},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2014.2298011},
  doi          = {10.1109/TDSC.2014.2298011},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/OthmaneAWB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PolcakJM14,
  author       = {Libor Polcak and
                  Jakub Jirasek and
                  Petr Matousek},
  title        = {Comment on "Remote Physical Device Fingerprinting"},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {5},
  pages        = {494--496},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.26},
  doi          = {10.1109/TDSC.2013.26},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/PolcakJM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/QinHL14,
  author       = {Yang Qin and
                  Dijiang Huang and
                  Bing Li},
  title        = {{STARS:} {A} Statistical Traffic Pattern Discovery System for MANETs},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {2},
  pages        = {181--192},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.33},
  doi          = {10.1109/TDSC.2013.33},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/QinHL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RahulamathavanPVCR14,
  author       = {Yogachandran Rahulamathavan and
                  Raphael Chung{-}Wei Phan and
                  Suresh Veluru and
                  Kanapathippillai Cumanan and
                  Muttukrishnan Rajarajan},
  title        = {Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing
                  the Data Classification in Cloud},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {5},
  pages        = {467--479},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.51},
  doi          = {10.1109/TDSC.2013.51},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/RahulamathavanPVCR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SalakoS14,
  author       = {Kizito Salako and
                  Lorenzo Strigini},
  title        = {When Does "Diversity" in Development Reduce Common Failures? Insights
                  from Probabilistic Modeling},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {2},
  pages        = {193--206},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.32},
  doi          = {10.1109/TDSC.2013.32},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SalakoS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShokriTPKH14,
  author       = {Reza Shokri and
                  George Theodorakopoulos and
                  Panos Papadimitratos and
                  Ehsan Kazemi and
                  Jean{-}Pierre Hubaux},
  title        = {Hiding in the Mobile Crowd: LocationPrivacy through Collaboration},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {3},
  pages        = {266--279},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.57},
  doi          = {10.1109/TDSC.2013.57},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ShokriTPKH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SkillenM14,
  author       = {Adam Skillen and
                  Mohammad Mannan},
  title        = {Mobiflage: Deniable Storage Encryptionfor Mobile Devices},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {3},
  pages        = {224--237},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.56},
  doi          = {10.1109/TDSC.2013.56},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SkillenM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TangCHS14,
  author       = {Jin Tang and
                  Yu Cheng and
                  Yong Hao and
                  Wei Song},
  title        = {{SIP} Flooding Attack Detection with a Multi-Dimensional Sketch Design},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {6},
  pages        = {582--595},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2014.2302298},
  doi          = {10.1109/TDSC.2014.2302298},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/TangCHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TianCW14,
  author       = {Wenhong Tian and
                  Yu Chen and
                  Xinyang Wang},
  title        = {A Note on "Orchestrating an Ensemble of MapReduce Jobs for Minimizing
                  Their Makespan"},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {4},
  pages        = {390--391},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.55},
  doi          = {10.1109/TDSC.2013.55},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/TianCW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VadlamudiC14,
  author       = {Satya Gautam Vadlamudi and
                  Partha Pratim Chakrabarti},
  title        = {Robustness Analysis of Embedded Control Systems with Respect to Signal
                  Perturbations: Finding Minimal Counterexamples Using Fault Injection},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {1},
  pages        = {45--58},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.23},
  doi          = {10.1109/TDSC.2013.23},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/VadlamudiC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VaidyaSFML14,
  author       = {Jaideep Vaidya and
                  Basit Shafiq and
                  Wei Fan and
                  Danish Mehmood and
                  David Lorenzi},
  title        = {A Random Decision Tree Framework for Privacy-Preserving Data Mining},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {5},
  pages        = {399--411},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.43},
  doi          = {10.1109/TDSC.2013.43},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/VaidyaSFML14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VimercatiFJLPS14,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Giovanni Livraga and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Fragmentation in Presence of Data Dependencies},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {6},
  pages        = {510--523},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.2295798},
  doi          = {10.1109/TDSC.2013.2295798},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/VimercatiFJLPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangJSCN14,
  author       = {Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal and
                  Pengsu Cheng and
                  Steven Noel},
  title        = {k-Zero Day Safety: {A} Network Security Metric for Measuring the Risk
                  of Unknown Vulnerabilities},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {1},
  pages        = {30--44},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.24},
  doi          = {10.1109/TDSC.2013.24},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangJSCN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WenZZXZJZ14,
  author       = {Sheng Wen and
                  Wei Zhou and
                  Jun Zhang and
                  Yang Xiang and
                  Wanlei Zhou and
                  Weijia Jia and
                  Cliff C. Zou},
  title        = {Modeling and Analysis on the Propagation Dynamics of Modern Email
                  Malware},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {4},
  pages        = {361--374},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.49},
  doi          = {10.1109/TDSC.2013.49},
  timestamp    = {Fri, 22 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WenZZXZJZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XiaYLMT14,
  author       = {Ruofan Xia and
                  Xiaoyan Yin and
                  Javier Alonso Lopez and
                  Fumio Machida and
                  Kishor S. Trivedi},
  title        = {Performance and Availability Modeling of ITSystems with Data Backup
                  and Restore},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {4},
  pages        = {375--389},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.50},
  doi          = {10.1109/TDSC.2013.50},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/XiaYLMT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuRCFMO14,
  author       = {Yi Xu and
                  Gerardo Reynaga and
                  Sonia Chiasson and
                  Jan{-}Michael Frahm and
                  Fabian Monrose and
                  Paul C. van Oorschot},
  title        = {Security Analysis and Related Usability of Motion-Based CAPTCHAs:
                  Decoding Codewords in Motion},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {5},
  pages        = {480--493},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.52},
  doi          = {10.1109/TDSC.2013.52},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/XuRCFMO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YiBVX14,
  author       = {Xun Yi and
                  Elisa Bertino and
                  Jaideep Vaidya and
                  Chaoping Xing},
  title        = {Private Searching on Streaming Data Based on Keyword Frequency},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {2},
  pages        = {155--167},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.36},
  doi          = {10.1109/TDSC.2013.36},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YiBVX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YinRMQL14,
  author       = {Shu Yin and
                  Xiaojun Ruan and
                  Adam Manzanares and
                  Xiao Qin and
                  Kenli Li},
  title        = {{MINT:} {A} Reliability Modeling Frameworkfor Energy-Efficient Parallel
                  Disk Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {4},
  pages        = {345--360},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.47},
  doi          = {10.1109/TDSC.2013.47},
  timestamp    = {Thu, 15 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YinRMQL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangWSS14,
  author       = {Fengwei Zhang and
                  Jiang Wang and
                  Kun Sun and
                  Angelos Stavrou},
  title        = {HyperCheck: {A} Hardware-AssistedIntegrity Monitor},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {4},
  pages        = {332--344},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.53},
  doi          = {10.1109/TDSC.2013.53},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangWSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhaoTGAW14,
  author       = {Jing Zhao and
                  Kishor S. Trivedi and
                  Michael Grottke and
                  Javier Alonso and
                  Yanbin Wang},
  title        = {Ensuring the Performance of Apache {HTTP} Server Affected by Aging},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {2},
  pages        = {130--141},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.38},
  doi          = {10.1109/TDSC.2013.38},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhaoTGAW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhauniarovichRCCF14,
  author       = {Yury Zhauniarovich and
                  Giovanni Russello and
                  Mauro Conti and
                  Bruno Crispo and
                  Earlence Fernandes},
  title        = {{MOSES:} Supporting and Enforcing Security Profiles on Smartphones},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {3},
  pages        = {211--223},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2014.2300482},
  doi          = {10.1109/TDSC.2014.2300482},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhauniarovichRCCF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics