Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/tdsc/tdsc17.bht:"
@article{DBLP:journals/tdsc/0001TWQ20, author = {Zheng Zheng and Kishor S. Trivedi and Nan Wang and Kun Qiu}, title = {Markov Regenerative Models of WebServers for Their User-Perceived Availability and Bottlenecks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {92--105}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2753803}, doi = {10.1109/TDSC.2017.2753803}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/0001TWQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0004ZFGZZ20, author = {Yuan Zhang and Boyu Zhu and Yixin Fang and Suxin Guo and Aidong Zhang and Sheng Zhong}, title = {Secure Inter-Domain Forwarding Loop Test in Software Defined Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {162--178}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2731773}, doi = {10.1109/TDSC.2017.2731773}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/0004ZFGZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0026LDL20, author = {Yang Yang and Ximeng Liu and Robert H. Deng and Yingjiu Li}, title = {Lightweight Sharable and Traceable Secure Mobile Health System}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {78--91}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2729556}, doi = {10.1109/TDSC.2017.2729556}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/0026LDL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AbrathCMBS20, author = {Bert Abrath and Bart Coppens and Mohit Mishra and Jens Van den Broeck and Bjorn De Sutter}, title = {{\textdollar}{\textbackslash}Delta{\textdollar}{\(\Delta\)}Breakpad: Diversified Binary Crash Reporting}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {841--856}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2823751}, doi = {10.1109/TDSC.2018.2823751}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/AbrathCMBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AizpuruaPM20, author = {Jose Ignacio Aizpurua and Yiannis Papadopoulos and Guillaume Merle}, title = {Explicit Modelling and Treatment of Repair in Prediction of Dependability}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1147--1162}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2857810}, doi = {10.1109/TDSC.2018.2857810}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/AizpuruaPM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BehniaOY20, author = {Rouzbeh Behnia and Muslum Ozgur Ozmen and Attila Altay Yavuz}, title = {Lattice-Based Public Key Searchable Encryption from Experimental Perspectives}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1269--1282}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2867462}, doi = {10.1109/TDSC.2018.2867462}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/BehniaOY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BergeCGW20, author = {Pierre Berg{\'{e}} and Jason Crampton and Gregory Z. Gutin and R{\'{e}}mi Watrigant}, title = {The Authorization Policy Existence Problem}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1333--1344}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2883416}, doi = {10.1109/TDSC.2018.2883416}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/BergeCGW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CatuognoGP20, author = {Luigi Catuogno and Clemente Galdi and Giuseppe Persiano}, title = {Secure Dependency Enforcement in Package Management Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {377--390}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2777991}, doi = {10.1109/TDSC.2017.2777991}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CatuognoGP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChakrabortyPS20, author = {Tanmoy Chakraborty and Fabio Pierazzi and V. S. Subrahmanian}, title = {{EC2:} Ensemble Clustering and Classification for Predicting Android Malware Families}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {262--277}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2739145}, doi = {10.1109/TDSC.2017.2739145}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ChakrabortyPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenHCP20, author = {Jiayi Chen and Jianping He and Lin Cai and Jianping Pan}, title = {Disclose More and Risk Less: Privacy Preserving Online Social Network Data Sharing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1173--1187}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2861403}, doi = {10.1109/TDSC.2018.2861403}, timestamp = {Wed, 16 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ChenHCP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenZCZQS20, author = {Dajiang Chen and Ning Zhang and Nan Cheng and Kuan Zhang and Zhiguang Qin and Xuemin Shen}, title = {Physical Layer based Message Authentication with Secure Channel Codes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {5}, pages = {1079--1093}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2846258}, doi = {10.1109/TDSC.2018.2846258}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ChenZCZQS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Cid-FuentesSF20, author = {Javier {\'{A}}lvarez Cid{-}Fuentes and Claudia Szabo and Katrina Falkner}, title = {Adaptive Performance Anomaly Detection in Distributed Systems Using Online SVMs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {5}, pages = {928--941}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2821693}, doi = {10.1109/TDSC.2018.2821693}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Cid-FuentesSF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CleemputSB20, author = {Jeroen Van Cleemput and Bjorn De Sutter and Koen De Bosschere}, title = {Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {35--49}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2729549}, doi = {10.1109/TDSC.2017.2729549}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CleemputSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CuiAR20, author = {Shujie Cui and Muhammad Rizwan Asghar and Giovanni Russello}, title = {Multi-CDN: Towards Privacy in Content Delivery Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {5}, pages = {984--999}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2833110}, doi = {10.1109/TDSC.2018.2833110}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CuiAR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DingYD20, author = {Wenxiu Ding and Zheng Yan and Robert H. Deng}, title = {Privacy-Preserving Data Processing with Flexible Access Control}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {363--376}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2786247}, doi = {10.1109/TDSC.2017.2786247}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DingYD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DongWMPGG20, author = {Boxiang Dong and Hui Wang and Anna Monreale and Dino Pedreschi and Fosca Giannotti and Wenge Guo}, title = {Authenticated Outlier Mining for Outsourced Databases}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {222--235}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2754493}, doi = {10.1109/TDSC.2017.2754493}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/DongWMPGG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Dorojevets20, author = {Mikhail Dorojevets}, title = {Energy-Efficient Superconductor Bloom Filters for Streaming Data Inspection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {5}, pages = {1015--1025}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2843318}, doi = {10.1109/TDSC.2018.2843318}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Dorojevets20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/EmuraHI20, author = {Keita Emura and Takuya Hayashi and Ai Ishida}, title = {Group Signatures with Time-Bound Keys Revisited: {A} New Model, an Efficient Construction, and its Implementation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {292--305}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2754247}, doi = {10.1109/TDSC.2017.2754247}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/EmuraHI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ErrapotuLYRPPH20, author = {Sai Mounika Errapotu and Hongning Li and Rong Yu and Shaolei Ren and Qingqi Pei and Miao Pan and Zhu Han}, title = {Clock Auction Inspired Privacy Preserving Emergency Demand Response in Colocation Data Centers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {691--702}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2875732}, doi = {10.1109/TDSC.2018.2875732}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ErrapotuLYRPPH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/EspositoFCPS20, author = {Christian Esposito and Massimo Ficco and Aniello Castiglione and Francesco Palmieri and Alfredo De Santis}, title = {Distributed Group Key Management for Event Notification Confidentiality Among Sensors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {566--580}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2799227}, doi = {10.1109/TDSC.2018.2799227}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/EspositoFCPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FengYZC20, author = {Jun Feng and Laurence T. Yang and Qing Zhu and Kim{-}Kwang Raymond Choo}, title = {Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {857--868}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2881452}, doi = {10.1109/TDSC.2018.2881452}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FengYZC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GovindarajGK20, author = {Rekha Govindaraj and Swaroop Ghosh and Srinivas Katkoori}, title = {Design, Analysis and Application of Embedded Resistive {RAM} Based Strong Arbiter {PUF}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1232--1242}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2866425}, doi = {10.1109/TDSC.2018.2866425}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/GovindarajGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuerraouiM20, author = {Rachid Guerraoui and Alexandre Maurer}, title = {The Cost of Scaling a Reliable Interconnection Topology}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {5}, pages = {1039--1050}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2845402}, doi = {10.1109/TDSC.2018.2845402}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/GuerraouiM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HanCCLFXW20, author = {Weili Han and Chang Cao and Hao Chen and Dong Li and Zheran Fang and Wenyuan Xu and X. Sean Wang}, title = {senDroid: Auditing Sensor Access in Android System-Wide}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {407--421}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2768536}, doi = {10.1109/TDSC.2017.2768536}, timestamp = {Wed, 10 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HanCCLFXW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HeGWWLY20, author = {Kai He and Jun Guo and Jian Weng and Jiasi Weng and Joseph K. Liu and Xun Yi}, title = {Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1207--1217}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2864186}, doi = {10.1109/TDSC.2018.2864186}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/HeGWWLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HeZWC20, author = {Debiao He and Yudi Zhang and Ding Wang and Kim{-}Kwang Raymond Choo}, title = {Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the {IEEE} {P1363} Standard for Public Key Cryptography}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {5}, pages = {1124--1132}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2857775}, doi = {10.1109/TDSC.2018.2857775}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HeZWC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HolgadoVV20, author = {Pilar Holgado and V{\'{\i}}ctor A. Villagr{\'{a}} and Luis V{\'{a}}zquez}, title = {Real-Time Multistep Attack Prediction Based on Hidden Markov Models}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {134--147}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2751478}, doi = {10.1109/TDSC.2017.2751478}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HolgadoVV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HongXGWH20, author = {Jianan Hong and Kaiping Xue and Na Gai and David S. L. Wei and Peilin Hong}, title = {Service Outsourcing in {F2C} Architecture with Attribute-based Anonymous Access Control and Bounded Service Number}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {5}, pages = {1051--1062}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2845381}, doi = {10.1109/TDSC.2018.2845381}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HongXGWH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HuLC20, author = {Ziyuan Hu and Shengli Liu and Kefei Chen}, title = {Privacy-Preserving Location-Based Services Query Scheme Against Quantum Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {5}, pages = {972--983}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2831199}, doi = {10.1109/TDSC.2018.2831199}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HuLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HuangSKKN20, author = {Chin{-}Tser Huang and Muhammad N. Sakib and Charles A. Kamhoua and Kevin A. Kwiat and Laurent Njilla}, title = {A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1257--1268}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2866821}, doi = {10.1109/TDSC.2018.2866821}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/HuangSKKN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HuangZPX20, author = {Yonggang Huang and Jun Zhang and Lei Pan and Yang Xiang}, title = {Privacy Protection in Interactive Content Based Image Retrieval}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {595--607}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2793923}, doi = {10.1109/TDSC.2018.2793923}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HuangZPX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/InanGS20, author = {Ali Inan and Mehmet Emre Gursoy and Y{\"{u}}cel Saygin}, title = {Sensitivity Analysis for Non-Interactive Differential Privacy: Bounds and Efficient Algorithms}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {194--207}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2734664}, doi = {10.1109/TDSC.2017.2734664}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/InanGS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ItkinW20, author = {Eyal Itkin and Avishai Wool}, title = {A Security Analysis and Revised Security Extension for the Precision Time Protocol}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {22--34}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2748583}, doi = {10.1109/TDSC.2017.2748583}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ItkinW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JangK20, author = {Jinsoo Jang and Brent ByungHoon Kang}, title = {Retrofitting the Partially Privileged Mode for {TEE} Communication Channel Protection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {5}, pages = {1000--1014}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2840709}, doi = {10.1109/TDSC.2018.2840709}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JangK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JiangXWLW20, author = {Linzhi Jiang and Chunxiang Xu and Xiaofang Wang and Bo Luo and Huaqun Wang}, title = {Secure outsourcing {SIFT:} Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {179--193}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2751476}, doi = {10.1109/TDSC.2017.2751476}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JiangXWLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JohnHOD20, author = {Tara Merin John and Syed Kamran Haider and Hamza Omar and Marten van Dijk}, title = {Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {436--442}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2779780}, doi = {10.1109/TDSC.2017.2779780}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JohnHOD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JumaSBT20, author = {Nahid Juma and Jonathan Shahen and Khalid Zaman Bijon and Mahesh Tripunitara}, title = {The Overhead from Combating Side-Channels in Cloud Systems Using VM-Scheduling}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {422--435}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2790932}, doi = {10.1109/TDSC.2018.2790932}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JumaSBT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KaitovicM20, author = {Igor Kaitovic and Miroslaw Malek}, title = {Impact of Failure Prediction on Availability: Modeling and Comparative Analysis of Predictive and Reactive Methods}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {493--505}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2806448}, doi = {10.1109/TDSC.2018.2806448}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KaitovicM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KamelSDFB20, author = {Dina Kamel and Fran{\c{c}}ois{-}Xavier Standaert and Alexandre Duc and Denis Flandre and Francesco Berti}, title = {Learning with Physical Noise or Errors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {5}, pages = {957--971}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2830763}, doi = {10.1109/TDSC.2018.2830763}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KamelSDFB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KaplanGNS20, author = {Emre Kaplan and Mehmet Emre Gursoy and Mehmet Ercan Nergiz and Y{\"{u}}cel Saygin}, title = {Known Sample Attacks on Relation Preserving Data Transformations}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {443--450}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2759732}, doi = {10.1109/TDSC.2017.2759732}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KaplanGNS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KhasawnehODAP20, author = {Khaled N. Khasawneh and Meltem Ozsoy and Caleb Donovick and Nael B. Abu{-}Ghazaleh and Dmitry Ponomarev}, title = {EnsembleHMD: Accurate Hardware Malware Detectors with Specialized Ensemble Classifiers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {620--633}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2801858}, doi = {10.1109/TDSC.2018.2801858}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KhasawnehODAP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KlempererJPH20, author = {Peter F. Klemperer and Hye Yoon Jeon and Bryan D. Payne and James C. Hoe}, title = {High-Performance Memory Snapshotting for Real-Time, Consistent, Hypervisor-Based Monitors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {518--535}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2805904}, doi = {10.1109/TDSC.2018.2805904}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KlempererJPH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiCZMWS20, author = {Huaxin Li and Qingrong Chen and Haojin Zhu and Di Ma and Hong Wen and Xuemin Sherman Shen}, title = {Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {350--362}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2754249}, doi = {10.1109/TDSC.2017.2754249}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiCZMWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiLSWLL20, author = {Jing Li and Peng Li and Rebecca J. Stones and Gang Wang and Zhongwei Li and Xiaoguang Liu}, title = {Reliability Equations for Cloud Storage Systems with Proactive Fault Tolerance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {782--794}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2882512}, doi = {10.1109/TDSC.2018.2882512}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiLSWLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiZQFR20, author = {Sheng Li and Xinpeng Zhang and Zhenxing Qian and Guorui Feng and Yanli Ren}, title = {Key Based Artificial Fingerprint Generation for Privacy Protection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {828--840}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2812192}, doi = {10.1109/TDSC.2018.2812192}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiZQFR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiangPK20, author = {Xiaohui Liang and Ronald A. Peterson and David Kotz}, title = {Securely Connecting Wearables to Ambient Displays with User Intent}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {676--690}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2840979}, doi = {10.1109/TDSC.2018.2840979}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiangPK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuDCYP20, author = {Ximeng Liu and Robert H. Deng and Kim{-}Kwang Raymond Choo and Yang Yang and HweeHwa Pang}, title = {Privacy-Preserving Outsourced Calculation Toolkit in the Cloud}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {5}, pages = {898--911}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2816656}, doi = {10.1109/TDSC.2018.2816656}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuDCYP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuLPRS20, author = {Zhe Liu and Patrick Longa and Geovandro C. C. F. Pereira and Oscar Reparaz and Hwajeong Seo}, title = {Four{\textdollar}{\textbackslash}mathbb \{Q\}{\textdollar}Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {536--549}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2799844}, doi = {10.1109/TDSC.2018.2799844}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuLPRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuLZL20, author = {Zishan Liu and Zhenyu Liu and Lin Zhang and Xiaodong Lin}, title = {{MARP:} {A} Distributed {MAC} Layer Attack Resistant Pseudonym Scheme for {VANET}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {869--882}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2838136}, doi = {10.1109/TDSC.2018.2838136}, timestamp = {Tue, 21 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiuLZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuYMD20, author = {Xueqiao Liu and Guomin Yang and Yi Mu and Robert H. Deng}, title = {Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1322--1332}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2876831}, doi = {10.1109/TDSC.2018.2876831}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiuYMD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LuLHL20, author = {Li Lu and Lingshuang Liu and Muhammad Jawad Hussain and Yongshuai Liu}, title = {I Sense You by Breath: Speaker Recognition via Breath Biometrics}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {306--319}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2767587}, doi = {10.1109/TDSC.2017.2767587}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LuLHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaAZLXLMG20, author = {Xiaobo Ma and Bo An and Mengchen Zhao and Xiapu Luo and Lei Xue and Zhenhua Li and Tony T. N. Miu and Xiaohong Guan}, title = {Randomized Security Patrolling for Link Flooding Attack Detection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {795--812}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2019.2892370}, doi = {10.1109/TDSC.2019.2892370}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MaAZLXLMG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaZYSHX20, author = {Hui Ma and Rui Zhang and Guomin Yang and Zishuai Song and Kai He and Yuting Xiao}, title = {Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {5}, pages = {1026--1038}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2844814}, doi = {10.1109/TDSC.2018.2844814}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MaZYSHX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaruseacG20, author = {Mihai Maruseac and Gabriel Ghinita}, title = {Precision-Enhanced Differentially-Private Mining of High-Confidence Association Rules}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1297--1309}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2868190}, doi = {10.1109/TDSC.2018.2868190}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/MaruseacG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MiCZPWR20, author = {Zeyu Mi and Haibo Chen and Yinqian Zhang and ShuangHe Peng and Xiaofeng Wang and Michael K. Reiter}, title = {{CPU} Elasticity to Mitigate Cross-VM Runtime Monitoring}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {5}, pages = {1094--1108}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2846742}, doi = {10.1109/TDSC.2018.2846742}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MiCZPWR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MohaisenGRLKNN20, author = {Aziz Mohaisen and Zhongshu Gu and Kui Ren and Zhenhua Li and Charles A. Kamhoua and Laurent L. Njilla and DaeHun Nyang}, title = {Look-Aside at Your Own Risk: Privacy Implications of {DNSSEC} Look-Aside Validation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {745--759}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2816026}, doi = {10.1109/TDSC.2018.2816026}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MohaisenGRLKNN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MontieriCAP20, author = {Antonio Montieri and Domenico Ciuonzo and Giuseppe Aceto and Antonio Pescap{\`{e}}}, title = {Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web)}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {662--675}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2804394}, doi = {10.1109/TDSC.2018.2804394}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MontieriCAP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MunirK20, author = {Arslan Munir and Farinaz Koushanfar}, title = {Design and Analysis of Secure and Dependable Automotive {CPS:} {A} Steer-by-Wire Case Study}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {813--827}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2846741}, doi = {10.1109/TDSC.2018.2846741}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MunirK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NaroueiTN20, author = {Masoud Narouei and Hassan Takabi and Rodney Nielsen}, title = {Automatic Extraction of Access Control Policies from Natural Language Documents}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {506--517}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2818708}, doi = {10.1109/TDSC.2018.2818708}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/NaroueiTN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NiZYLS20, author = {Jianbing Ni and Kuan Zhang and Yong Yu and Xiaodong Lin and Xuemin Sherman Shen}, title = {Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {581--594}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2791432}, doi = {10.1109/TDSC.2018.2791432}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/NiZYLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/OuQLHJ20, author = {Lu Ou and Zheng Qin and Shaolin Liao and Yuan Hong and Xiaohua Jia}, title = {Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {5}, pages = {1109--1123}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2853105}, doi = {10.1109/TDSC.2018.2853105}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/OuQLHJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PanH0G0TC20, author = {Yanjun Pan and Yantian Hou and Ming Li and Ryan M. Gerdes and Kai Zeng and Md. Asaduzzaman Towfiq and Bedri A. Cetiner}, title = {Message Integrity Protection Over Wireless Channel: Countering Signal Cancellation via Channel Randomization}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {106--120}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2751600}, doi = {10.1109/TDSC.2017.2751600}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PanH0G0TC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ParkKRWHX20, author = {Sungjin Park and Chung Hwan Kim and Junghwan Rhee and Jong{-}Jin Won and Taisook Han and Dongyan Xu}, title = {{CAFE:} {A} Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {883--897}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2817545}, doi = {10.1109/TDSC.2018.2817545}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ParkKRWHX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RahmanD20, author = {Mohammad Ashiqur Rahman and Amarjit Datta}, title = {Impact of Stealthy Attacks on Optimal Power Flow: {A} Simulink-Driven Formal Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {451--464}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2806969}, doi = {10.1109/TDSC.2018.2806969}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RahmanD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RajkumarS20, author = {P. V. Rajkumar and Ravi S. Sandhu}, title = {Safety Decidability for Pre-Authorization Usage Control with Identifier Attribute Domains}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {465--478}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2839745}, doi = {10.1109/TDSC.2018.2839745}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/RajkumarS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SalvePMR20, author = {Andrea De Salve and Roberto Di Pietro and Paolo Mori and Laura Ricci}, title = {A Logical Key Hierarchy Based Approach to Preserve Content Privacy in Decentralized Online Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {2--21}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2729553}, doi = {10.1109/TDSC.2017.2729553}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SalvePMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SatyalWB020, author = {Suhrid Satyal and Ingo Weber and Len Bass and Min Fu}, title = {Rollback Mechanisms for Cloud Management APIs Using {AI} Planning}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {148--161}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2729543}, doi = {10.1109/TDSC.2017.2729543}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SatyalWB020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SaxenaSKCC20, author = {Neetesh Saxena and Hong Shen and Nikos Komninos and Kim{-}Kwang Raymond Choo and Narendra S. Chaudhari}, title = {{BVPSMS:} {A} Batch Verification Protocol for End-to-End Secure {SMS} for Mobile Users}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {550--565}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2799223}, doi = {10.1109/TDSC.2018.2799223}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/SaxenaSKCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShahzadSL20, author = {Muhammad Shahzad and M. Zubair Shafiq and Alex X. Liu}, title = {Large Scale Characterization of Software Vulnerability Life Cycles}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {730--744}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2019.2893950}, doi = {10.1109/TDSC.2019.2893950}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ShahzadSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShenCGM20, author = {Chao Shen and Yufei Chen and Xiaohong Guan and Roy A. Maxion}, title = {Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication System}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {335--349}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2771295}, doi = {10.1109/TDSC.2017.2771295}, timestamp = {Tue, 29 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShenCGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShenLSG20, author = {Zhirong Shen and Patrick P. C. Lee and Jiwu Shu and Wenzhong Guo}, title = {Cross-Rack-Aware Single Failure Recovery for Clustered File Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {248--261}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2774299}, doi = {10.1109/TDSC.2017.2774299}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShenLSG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SongDYXZ20, author = {Xiangfu Song and Changyu Dong and Dandan Yuan and Qiuliang Xu and Minghao Zhao}, title = {Forward Private Searchable Symmetric Encryption with Optimized {I/O} Efficiency}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {5}, pages = {912--927}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2822294}, doi = {10.1109/TDSC.2018.2822294}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SongDYXZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SongHH20, author = {Wei Song and Qingqing Huang and Jeff Huang}, title = {Understanding JavaScript Vulnerabilities in Large Real-World Android Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {5}, pages = {1063--1078}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2845851}, doi = {10.1109/TDSC.2018.2845851}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SongHH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SrinivasDKR20, author = {Jangirala Srinivas and Ashok Kumar Das and Neeraj Kumar and Joel J. P. C. Rodrigues}, title = {Cloud Centric Authentication for Wearable Healthcare Monitoring System}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {5}, pages = {942--956}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2828306}, doi = {10.1109/TDSC.2018.2828306}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SrinivasDKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SrinivasDWK20, author = {Jangirala Srinivas and Ashok Kumar Das and Mohammad Wazid and Neeraj Kumar}, title = {Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1133--1146}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2857811}, doi = {10.1109/TDSC.2018.2857811}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/SrinivasDWK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TianYRTP20, author = {Ke Tian and Danfeng Yao and Barbara G. Ryder and Gang Tan and Guojun Peng}, title = {Detection of Repackaged Android Malware with Code-Heterogeneity Features}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {64--77}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2745575}, doi = {10.1109/TDSC.2017.2745575}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TianYRTP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Vaidya20, author = {Jaideep Vaidya}, title = {Editorial}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {1}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2019.2958396}, doi = {10.1109/TDSC.2019.2958396}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Vaidya20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ViscontiG20, author = {Andrea Visconti and Federico Gorla}, title = {Exploiting an {HMAC-SHA-1} Optimization to Speed up {PBKDF2}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {775--781}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2878697}, doi = {10.1109/TDSC.2018.2878697}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ViscontiG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WalzS20, author = {Andreas Walz and Axel Sikora}, title = {Exploiting Dissent: Towards Fuzzing-Based Differential Black-Box Testing of {TLS} Implementations}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {278--291}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2763947}, doi = {10.1109/TDSC.2017.2763947}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WalzS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangCCM20, author = {An Wang and Wentao Chang and Songqing Chen and Aziz Mohaisen}, title = {A Data-Driven Study of DDoS Attacks and Their Dynamics}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {648--661}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2808344}, doi = {10.1109/TDSC.2018.2808344}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangCCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WazidDOKS20, author = {Mohammad Wazid and Ashok Kumar Das and Vanga Odelu and Neeraj Kumar and Willy Susilo}, title = {Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {391--406}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2764083}, doi = {10.1109/TDSC.2017.2764083}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WazidDOKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XieFHLSL20, author = {Yulai Xie and Dan Feng and Yuchong Hu and Yan Li and Staunton Sample and Darrell D. E. Long}, title = {Pagoda: {A} Hybrid Approach to Enable Efficient Real-Time Provenance Based Intrusion Detection in Big Data Environments}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1283--1296}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2867595}, doi = {10.1109/TDSC.2018.2867595}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XieFHLSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuTCW20, author = {Wenyuan Xu and Jing Tian and Yu Cao and Song Wang}, title = {Challenge-Response Authentication Using In-Air Handwriting Style Verification}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {51--64}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2752164}, doi = {10.1109/TDSC.2017.2752164}, timestamp = {Wed, 10 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuTCW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuZZL20, author = {Hui Xu and Zirui Zhao and Yangfan Zhou and Michael R. Lyu}, title = {Benchmarking the Capability of Symbolic Execution Tools with Logic Bombs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1243--1256}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2866469}, doi = {10.1109/TDSC.2018.2866469}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/XuZZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YangLD20, author = {Yang Yang and Ximeng Liu and Robert H. Deng}, title = {Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary Language}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {320--334}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2787588}, doi = {10.1109/TDSC.2017.2787588}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YangLD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YangLYT20, author = {Lu{-}Xing Yang and Pengdeng Li and Xiaofan Yang and Yuan Yan Tang}, title = {A Risk Management Approach to Defending Against the Advanced Persistent Threat}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1163--1172}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2858786}, doi = {10.1109/TDSC.2018.2858786}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/YangLYT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YaoFDFW20, author = {Lin Yao and Zhenzhen Fan and Jing Deng and Xin Fan and Guowei Wu}, title = {Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1310--1321}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2876257}, doi = {10.1109/TDSC.2018.2876257}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/YaoFDFW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YouLSWZ20, author = {Wei You and Bin Liang and Wenchang Shi and Peng Wang and Xiangyu Zhang}, title = {TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {209--222}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2740169}, doi = {10.1109/TDSC.2017.2740169}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YouLSWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangL20, author = {Yan Zhang and Loukas Lazos}, title = {Misbehavior in Multi-Channel {MAC} Protocols}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {760--774}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2819170}, doi = {10.1109/TDSC.2018.2819170}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangMCZD20, author = {Lei Zhang and Xinyu Meng and Kim{-}Kwang Raymond Choo and Yuanfei Zhang and Feifei Dai}, title = {Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {634--647}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2797190}, doi = {10.1109/TDSC.2018.2797190}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangMCZD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangYHWR20, author = {Yue Zhang and Jia Yu and Rong Hao and Cong Wang and Kui Ren}, title = {Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {608--619}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2829880}, doi = {10.1109/TDSC.2018.2829880}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangYHWR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangZHC20, author = {Zhikun Zhang and Heng Zhang and Shibo He and Peng Cheng}, title = {Bilateral Privacy-Preserving Utility Maximization Protocol in Database-Driven Cognitive Radio Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {236--247}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2781248}, doi = {10.1109/TDSC.2017.2781248}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangZHC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangZWWSR20, author = {Leo Yu Zhang and Yifeng Zheng and Jian Weng and Cong Wang and Zihao Shan and Kui Ren}, title = {You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1218--1231}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2864748}, doi = {10.1109/TDSC.2018.2864748}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangZWWSR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhaoC20, author = {Liang Zhao and Liqun Chen}, title = {Sparse Matrix Masking-Based Non-Interactive Verifiable (Outsourced) Computation, Revisited}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1188--1206}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2861699}, doi = {10.1109/TDSC.2018.2861699}, timestamp = {Wed, 08 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ZhaoC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhaoKKKN20, author = {Hong Zhao and Luke Kwiat and Kevin A. Kwiat and Charles A. Kamhoua and Laurent Njilla}, title = {Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {716--729}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2864733}, doi = {10.1109/TDSC.2018.2864733}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhaoKKKN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhengDY020, author = {Yifeng Zheng and Huayi Duan and Xingliang Yuan and Cong Wang}, title = {Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {121--133}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2753245}, doi = {10.1109/TDSC.2017.2753245}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhengDY020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhuLZM20, author = {Xiaonan Zhu and Jinku Li and Yajin Zhou and Jianfeng Ma}, title = {AdCapsule: Practical Confinement of Advertisements in Android Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {479--492}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2814999}, doi = {10.1109/TDSC.2018.2814999}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhuLZM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhuLZQ20, author = {Liehuang Zhu and Meng Li and Zijian Zhang and Zhan Qin}, title = {{ASAP:} An Anonymous Smart-Parking and Payment Scheme in Vehicular Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {703--715}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2850780}, doi = {10.1109/TDSC.2018.2850780}, timestamp = {Wed, 19 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhuLZQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.