Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/tdsc/tdsc11.bht:"
@article{DBLP:journals/tdsc/AlmohriYK14, author = {Hussain M. J. Almohri and Danfeng Yao and Dennis G. Kafura}, title = {Process Authentication for High System Assurance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {2}, pages = {168--180}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.29}, doi = {10.1109/TDSC.2013.29}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AlmohriYK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BasilicoGMS14, author = {Nicola Basilico and Nicola Gatti and Mattia Monga and Sabrina Sicari}, title = {Security Games for Node Localization through Verifiable Multilateration}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {1}, pages = {72--85}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.30}, doi = {10.1109/TDSC.2013.30}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BasilicoGMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Bertino14, author = {Elisa Bertino}, title = {Editorial}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {1}, pages = {1}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.3}, doi = {10.1109/TDSC.2014.3}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Bertino14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CesareXZ14, author = {Silvio Cesare and Yang Xiang and Wanlei Zhou}, title = {Control Flow-Based Malware VariantDetection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {4}, pages = {307--317}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.40}, doi = {10.1109/TDSC.2013.40}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CesareXZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CheekS14, author = {Gorrell P. Cheek and Mohamed Shehab}, title = {Human Effects of Enhanced Privacy Management Models}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {2}, pages = {142--154}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.34}, doi = {10.1109/TDSC.2013.34}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CheekS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChoLL14, author = {Kwantae Cho and Byung{-}Gil Lee and Dong Hoon Lee}, title = {Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {5}, pages = {454--466}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.41}, doi = {10.1109/TDSC.2013.41}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChoLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ColomboF14, author = {Pietro Colombo and Elena Ferrari}, title = {Enforcing Obligations within RelationalDatabase Management Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {4}, pages = {318--331}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.48}, doi = {10.1109/TDSC.2013.48}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ColomboF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FiorinS14, author = {Leandro Fiorin and Mariagiovanna Sami}, title = {Fault-Tolerant Network Interfaces for Networks-on-Chip}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {1}, pages = {16--29}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.28}, doi = {10.1109/TDSC.2013.28}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FiorinS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FoketSB14, author = {Christophe Foket and Bjorn De Sutter and Koen De Bosschere}, title = {Pushing Java Type Obfuscation to the Limit}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {6}, pages = {553--567}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2305990}, doi = {10.1109/TDSC.2014.2305990}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FoketSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FonsecaSVM14, author = {Jos{\'{e}} Fonseca and Nuno Seixas and Marco Vieira and Henrique Madeira}, title = {Analysis of Field Data on Web Security Vulnerabilities}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {2}, pages = {89--100}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.37}, doi = {10.1109/TDSC.2013.37}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FonsecaSVM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FonsecaVM14, author = {Jos{\'{e}} Fonseca and Marco Vieira and Henrique Madeira}, title = {Evaluation of Web Security Mechanisms Using Vulnerability {\&} Attack Injection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {5}, pages = {440--453}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.45}, doi = {10.1109/TDSC.2013.45}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FonsecaVM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GatesCLP14, author = {Christopher S. Gates and Jing Chen and Ninghui Li and Robert W. Proctor}, title = {Effective Risk Communication for Android Apps}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {3}, pages = {252--265}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.58}, doi = {10.1109/TDSC.2013.58}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GatesCLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GatesLPSQPNM14, author = {Christopher S. Gates and Ninghui Li and Hao Peng and Bhaskar Pratim Sarma and Yuan Qi and Rahul Potharaju and Cristina Nita{-}Rotaru and Ian M. Molloy}, title = {Generating Summary Risk Scores for Mobile Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {3}, pages = {238--251}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2302293}, doi = {10.1109/TDSC.2014.2302293}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/GatesLPSQPNM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuptaSX14, author = {Puneet Gupta and Scott D. Stoller and Zhongyuan Xu}, title = {Abductive Analysis of Administrative Policies in Rule-Based Access Control}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {5}, pages = {412--424}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.42}, doi = {10.1109/TDSC.2013.42}, timestamp = {Thu, 28 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GuptaSX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HanLC14, author = {Kyuseung Han and Ganghee Lee and Kiyoung Choi}, title = {Software-Level Approaches for Tolerating Transient Faults in a Coarse-GrainedReconfigurable Architecture}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {4}, pages = {392--398}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.54}, doi = {10.1109/TDSC.2013.54}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HanLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Holm14, author = {Hannes Holm}, title = {A Large-Scale Study of the Time Required to Compromise a Computer System}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {1}, pages = {2--15}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.21}, doi = {10.1109/TDSC.2013.21}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Holm14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HuangQZKX14, author = {Jianzhong Huang and Xiao Qin and Fenghao Zhang and Wei{-}Shinn Ku and Changsheng Xie}, title = {{MFTS:} {A} Multi-Level Fault-Tolerant Archiving Storage with Optimized Maintenance Bandwidth}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {6}, pages = {524--537}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2304296}, doi = {10.1109/TDSC.2014.2304296}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HuangQZKX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Lee14, author = {Younho Lee}, title = {Secure Ordered Bucketization}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {3}, pages = {292--303}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2313863}, doi = {10.1109/TDSC.2014.2313863}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Lee14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiCP14, author = {Qinghua Li and Guohong Cao and Thomas F. La Porta}, title = {Efficient and Privacy-Aware Data Aggregation in Mobile Sensing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {2}, pages = {115--129}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.31}, doi = {10.1109/TDSC.2013.31}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiCP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiWC14, author = {Xin Li and Xinyuan Wang and Wentao Chang}, title = {CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {2}, pages = {101--114}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2012.83}, doi = {10.1109/TDSC.2012.83}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiWC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiberatoreLSL14, author = {Marc Liberatore and Brian Neil Levine and Clay Shields and Brian Lynn}, title = {Efficient Tagging of Remote Peers during Child Pornography Investigations}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {5}, pages = {425--439}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.46}, doi = {10.1109/TDSC.2013.46}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiberatoreLSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuWCRZD14, author = {Wen Ming Liu and Lingyu Wang and Pengsu Cheng and Kui Ren and Shunzhi Zhu and Mourad Debbabi}, title = {{PPTP:} Privacy-Preserving Traffic Padding in Web-Based Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {6}, pages = {538--552}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2302308}, doi = {10.1109/TDSC.2014.2302308}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuWCRZD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MerloMGPC14, author = {Alessio Merlo and Mauro Migliardi and Nicola Gobbo and Francesco Palmieri and Aniello Castiglione}, title = {A Denial of Service Attack to {UMTS} Networks Using SIM-Less Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {3}, pages = {280--291}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2315198}, doi = {10.1109/TDSC.2014.2315198}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/MerloMGPC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MohammedAFD14, author = {Noman Mohammed and Dima Alhadidi and Benjamin C. M. Fung and Mourad Debbabi}, title = {Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {1}, pages = {59--71}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.22}, doi = {10.1109/TDSC.2013.22}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MohammedAFD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/OthmaneAWB14, author = {Lotfi Ben Othmane and Pelin Angin and Harold Weffers and Bharat K. Bhargava}, title = {Extending the Agile Development Process to Develop Acceptably Secure Software}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {6}, pages = {497--509}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2298011}, doi = {10.1109/TDSC.2014.2298011}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/OthmaneAWB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PolcakJM14, author = {Libor Polcak and Jakub Jirasek and Petr Matousek}, title = {Comment on "Remote Physical Device Fingerprinting"}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {5}, pages = {494--496}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.26}, doi = {10.1109/TDSC.2013.26}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PolcakJM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/QinHL14, author = {Yang Qin and Dijiang Huang and Bing Li}, title = {{STARS:} {A} Statistical Traffic Pattern Discovery System for MANETs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {2}, pages = {181--192}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.33}, doi = {10.1109/TDSC.2013.33}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/QinHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RahulamathavanPVCR14, author = {Yogachandran Rahulamathavan and Raphael Chung{-}Wei Phan and Suresh Veluru and Kanapathippillai Cumanan and Muttukrishnan Rajarajan}, title = {Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {5}, pages = {467--479}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.51}, doi = {10.1109/TDSC.2013.51}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RahulamathavanPVCR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SalakoS14, author = {Kizito Salako and Lorenzo Strigini}, title = {When Does "Diversity" in Development Reduce Common Failures? Insights from Probabilistic Modeling}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {2}, pages = {193--206}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.32}, doi = {10.1109/TDSC.2013.32}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SalakoS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShokriTPKH14, author = {Reza Shokri and George Theodorakopoulos and Panos Papadimitratos and Ehsan Kazemi and Jean{-}Pierre Hubaux}, title = {Hiding in the Mobile Crowd: LocationPrivacy through Collaboration}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {3}, pages = {266--279}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.57}, doi = {10.1109/TDSC.2013.57}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShokriTPKH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SkillenM14, author = {Adam Skillen and Mohammad Mannan}, title = {Mobiflage: Deniable Storage Encryptionfor Mobile Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {3}, pages = {224--237}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.56}, doi = {10.1109/TDSC.2013.56}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SkillenM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TangCHS14, author = {Jin Tang and Yu Cheng and Yong Hao and Wei Song}, title = {{SIP} Flooding Attack Detection with a Multi-Dimensional Sketch Design}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {6}, pages = {582--595}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2302298}, doi = {10.1109/TDSC.2014.2302298}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/TangCHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TianCW14, author = {Wenhong Tian and Yu Chen and Xinyang Wang}, title = {A Note on "Orchestrating an Ensemble of MapReduce Jobs for Minimizing Their Makespan"}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {4}, pages = {390--391}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.55}, doi = {10.1109/TDSC.2013.55}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TianCW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/VadlamudiC14, author = {Satya Gautam Vadlamudi and Partha Pratim Chakrabarti}, title = {Robustness Analysis of Embedded Control Systems with Respect to Signal Perturbations: Finding Minimal Counterexamples Using Fault Injection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {1}, pages = {45--58}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.23}, doi = {10.1109/TDSC.2013.23}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/VadlamudiC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/VaidyaSFML14, author = {Jaideep Vaidya and Basit Shafiq and Wei Fan and Danish Mehmood and David Lorenzi}, title = {A Random Decision Tree Framework for Privacy-Preserving Data Mining}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {5}, pages = {399--411}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.43}, doi = {10.1109/TDSC.2013.43}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/VaidyaSFML14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/VimercatiFJLPS14, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Giovanni Livraga and Stefano Paraboschi and Pierangela Samarati}, title = {Fragmentation in Presence of Data Dependencies}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {6}, pages = {510--523}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.2295798}, doi = {10.1109/TDSC.2013.2295798}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/VimercatiFJLPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangJSCN14, author = {Lingyu Wang and Sushil Jajodia and Anoop Singhal and Pengsu Cheng and Steven Noel}, title = {k-Zero Day Safety: {A} Network Security Metric for Measuring the Risk of Unknown Vulnerabilities}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {1}, pages = {30--44}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.24}, doi = {10.1109/TDSC.2013.24}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangJSCN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WenZZXZJZ14, author = {Sheng Wen and Wei Zhou and Jun Zhang and Yang Xiang and Wanlei Zhou and Weijia Jia and Cliff C. Zou}, title = {Modeling and Analysis on the Propagation Dynamics of Modern Email Malware}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {4}, pages = {361--374}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.49}, doi = {10.1109/TDSC.2013.49}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WenZZXZJZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XiaYLMT14, author = {Ruofan Xia and Xiaoyan Yin and Javier Alonso Lopez and Fumio Machida and Kishor S. Trivedi}, title = {Performance and Availability Modeling of ITSystems with Data Backup and Restore}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {4}, pages = {375--389}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.50}, doi = {10.1109/TDSC.2013.50}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/XiaYLMT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuRCFMO14, author = {Yi Xu and Gerardo Reynaga and Sonia Chiasson and Jan{-}Michael Frahm and Fabian Monrose and Paul C. van Oorschot}, title = {Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {5}, pages = {480--493}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.52}, doi = {10.1109/TDSC.2013.52}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/XuRCFMO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YiBVX14, author = {Xun Yi and Elisa Bertino and Jaideep Vaidya and Chaoping Xing}, title = {Private Searching on Streaming Data Based on Keyword Frequency}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {2}, pages = {155--167}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.36}, doi = {10.1109/TDSC.2013.36}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YiBVX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YinRMQL14, author = {Shu Yin and Xiaojun Ruan and Adam Manzanares and Xiao Qin and Kenli Li}, title = {{MINT:} {A} Reliability Modeling Frameworkfor Energy-Efficient Parallel Disk Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {4}, pages = {345--360}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.47}, doi = {10.1109/TDSC.2013.47}, timestamp = {Thu, 15 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YinRMQL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangWSS14, author = {Fengwei Zhang and Jiang Wang and Kun Sun and Angelos Stavrou}, title = {HyperCheck: {A} Hardware-AssistedIntegrity Monitor}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {4}, pages = {332--344}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.53}, doi = {10.1109/TDSC.2013.53}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangWSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhaoTGAW14, author = {Jing Zhao and Kishor S. Trivedi and Michael Grottke and Javier Alonso and Yanbin Wang}, title = {Ensuring the Performance of Apache {HTTP} Server Affected by Aging}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {2}, pages = {130--141}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.38}, doi = {10.1109/TDSC.2013.38}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ZhaoTGAW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhauniarovichRCCF14, author = {Yury Zhauniarovich and Giovanni Russello and Mauro Conti and Bruno Crispo and Earlence Fernandes}, title = {{MOSES:} Supporting and Enforcing Security Profiles on Smartphones}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {3}, pages = {211--223}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2300482}, doi = {10.1109/TDSC.2014.2300482}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhauniarovichRCCF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.