Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/tdsc/tdsc10.bht:"
@article{DBLP:journals/tdsc/AddisAPS013, author = {Bernardetta Addis and Danilo Ardagna and Barbara Panicucci and Mark S. Squillante and Li Zhang}, title = {A Hierarchical Approach for the Resource Management of Very Large Cloud Platforms}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {5}, pages = {253--272}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.4}, doi = {10.1109/TDSC.2013.4}, timestamp = {Sat, 02 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AddisAPS013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AlamriBT13, author = {Abdullah Alamri and Peter Bert{\'{o}}k and James A. Thom}, title = {Authorization Control for a Semantic Data Repository through an Inference Policy Engine}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {6}, pages = {328--340}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.20}, doi = {10.1109/TDSC.2013.20}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AlamriBT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BiskupL13, author = {Joachim Biskup and Lan Li}, title = {On Inference-Proof View Processing of {XML} Documents}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {2}, pages = {99--113}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.86}, doi = {10.1109/TDSC.2012.86}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BiskupL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BohliGJIM13, author = {Jens{-}Matthias Bohli and Nils Gruschka and Meiko Jensen and Luigi Lo Iacono and Ninja Marnau}, title = {Security and Privacy-Enhancing Multicloud Architectures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {4}, pages = {212--224}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.6}, doi = {10.1109/TDSC.2013.6}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BohliGJIM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BrunM13, author = {Yuriy Brun and Nenad Medvidovic}, title = {Entrusting Private Computation and Data to Untrusted Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {4}, pages = {225--238}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.13}, doi = {10.1109/TDSC.2013.13}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BrunM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CanB13, author = {Ahmet Burak Can and Bharat K. Bhargava}, title = {{SORT:} {A} Self-ORganizing Trust Model for Peer-to-Peer Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {1}, pages = {14--27}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.74}, doi = {10.1109/TDSC.2012.74}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CanB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CarminatiFG13, author = {Barbara Carminati and Elena Ferrari and Michele Guglielmi}, title = {A System for Timely and Controlled Information Sharing in Emergency Situations}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {3}, pages = {129--142}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.11}, doi = {10.1109/TDSC.2013.11}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CarminatiFG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenJZZLZS13, author = {Gang Chen and Hai Jin and Deqing Zou and Bing Bing Zhou and Zhenkai Liang and Weide Zheng and Xuanhua Shi}, title = {SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {6}, pages = {368--379}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.25}, doi = {10.1109/TDSC.2013.25}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChenJZZLZS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChungKXLH13, author = {Chun{-}Jen Chung and Pankaj Khatkar and Tianyi Xing and Jeongkeun Lee and Dijiang Huang}, title = {{NICE:} Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {4}, pages = {198--211}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.8}, doi = {10.1109/TDSC.2013.8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChungKXLH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CostaPBC13, author = {Pedro A. R. S. Costa and Marcelo Pasin and Alysson Neves Bessani and Miguel P. Correia}, title = {On the Performance of Byzantine Fault-Tolerant MapReduce}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {5}, pages = {301--313}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.7}, doi = {10.1109/TDSC.2013.7}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CostaPBC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DistefanoPT13, author = {Salvatore Distefano and Antonio Puliafito and Kishor S. Trivedi}, title = {Guest Editors' Introduction: Special Section on Cloud Computing Assessment: Metrics, Algorithms, Policies, Models, and Evaluation Techniques}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {4}, pages = {196--197}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.27}, doi = {10.1109/TDSC.2013.27}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DistefanoPT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DistefanoPT13a, author = {Salvatore Distefano and Antonio Puliafito and Kishor S. Trivedi}, title = {Guest Editors' Introduction: Special Section on Cloud Computing Assessment: Metrics, Algorithms, Policies, Models, and Evaluation Techniques}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {5}, pages = {251--252}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.35}, doi = {10.1109/TDSC.2013.35}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DistefanoPT13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DuanPL13, author = {Lide Duan and Lu Peng and Bin Li}, title = {Predicting Architectural Vulnerability on Multithreaded Processors under Resource Contention and Sharing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {2}, pages = {114--127}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.87}, doi = {10.1109/TDSC.2012.87}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/DuanPL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FreudigerMHP13, author = {Julien Freudiger and Mohammad Hossein Manshaei and Jean{-}Pierre Hubaux and David C. Parkes}, title = {Non-Cooperative Location Privacy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {2}, pages = {84--98}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.85}, doi = {10.1109/TDSC.2012.85}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FreudigerMHP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HermenierLM13, author = {Fabien Hermenier and Julia Lawall and Gilles Muller}, title = {BtrPlace: {A} Flexible Consolidation Manager for Highly Available Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {5}, pages = {273--286}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.5}, doi = {10.1109/TDSC.2013.5}, timestamp = {Mon, 17 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/HermenierLM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HuAK13, author = {Hongxin Hu and Gail{-}Joon Ahn and Ketan Kulkarni}, title = {Discovery and Resolution of Anomalies in Web Access Control Policies}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {6}, pages = {341--354}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.18}, doi = {10.1109/TDSC.2013.18}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HuAK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LeeK13, author = {Sangho Lee and Jong Kim}, title = {WarningBird: {A} Near Real-Time Detection System for Suspicious URLs in Twitter Stream}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {3}, pages = {183--195}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.3}, doi = {10.1109/TDSC.2013.3}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LeeK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiGZC13, author = {Qinghua Li and Wei Gao and Sencun Zhu and Guohong Cao}, title = {To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {3}, pages = {168--182}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.84}, doi = {10.1109/TDSC.2012.84}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiGZC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaSXZ13, author = {Di Ma and Nitesh Saxena and Tuo Xiang and Yan Zhu}, title = {Location-Aware and Safer Cards: Enhancing {RFID} Security and Privacy via Location Sensing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {2}, pages = {57--69}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.89}, doi = {10.1109/TDSC.2012.89}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/MaSXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MohaisenKVKK13, author = {Abedelaziz Mohaisen and Denis Foo Kune and Eugene Y. Vasserman and Myungsun Kim and Yongdae Kim}, title = {Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {6}, pages = {380--393}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.19}, doi = {10.1109/TDSC.2013.19}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/MohaisenKVKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/OrtolaniGC13, author = {Stefano Ortolani and Cristiano Giuffrida and Bruno Crispo}, title = {Unprivileged Black-Box Detection of User-Space Keyloggers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {1}, pages = {40--52}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.76}, doi = {10.1109/TDSC.2012.76}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/OrtolaniGC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PapagianniLP13, author = {Chrysa Papagianni and Aris Leivadeas and Symeon Papavassiliou}, title = {A Cloud-Oriented Content Delivery Network Paradigm: Modeling and Assessment}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {5}, pages = {287--300}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.12}, doi = {10.1109/TDSC.2013.12}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/PapagianniLP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PoturalskiPH13, author = {Marcin Poturalski and Panos Papadimitratos and Jean{-}Pierre Hubaux}, title = {Formal Analysis of Secure Neighbor Discovery in Wireless Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {6}, pages = {355--367}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.17}, doi = {10.1109/TDSC.2013.17}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PoturalskiPH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RafnssonNS13, author = {Willard Rafnsson and Keiko Nakata and Andrei Sabelfeld}, title = {Securing Class Initialization in Java-like Languages}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {1}, pages = {1--13}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.73}, doi = {10.1109/TDSC.2012.73}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RafnssonNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Raguram0XFGM13, author = {Rahul Raguram and Andrew M. White and Yi Xu and Jan{-}Michael Frahm and Pierre Georgel and Fabian Monrose}, title = {On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {3}, pages = {154--167}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.16}, doi = {10.1109/TDSC.2013.16}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/Raguram0XFGM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Shan0C13, author = {Zhiyong Shan and Xin Wang and Tzi{-}cker Chiueh}, title = {Malware Clearance for Secure Commitment of OS-Level Virtual Machines}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {2}, pages = {70--83}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.88}, doi = {10.1109/TDSC.2012.88}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Shan0C13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TripunitaraL13, author = {Mahesh V. Tripunitara and Ninghui Li}, title = {The Foundational Work of Harrison-Ruzzo-Ullman Revisited}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {1}, pages = {28--39}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.77}, doi = {10.1109/TDSC.2012.77}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TripunitaraL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/VermaCC13, author = {Abhishek Verma and Ludmila Cherkasova and Roy H. Campbell}, title = {Orchestrating an Ensemble of MapReduce Jobs for Minimizing Their Makespan}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {5}, pages = {314--327}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.14}, doi = {10.1109/TDSC.2013.14}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/VermaCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuBSY13, author = {Kui Xu and Patrick Butler and Sudip Saha and Danfeng (Daphne) Yao}, title = {{DNS} for Massive-Scale Command and Control}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {3}, pages = {143--153}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.10}, doi = {10.1109/TDSC.2013.10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuBSY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YuLZXL13, author = {Jiadi Yu and Peng Lu and Yanmin Zhu and Guangtao Xue and Minglu Li}, title = {Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {4}, pages = {239--250}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.9}, doi = {10.1109/TDSC.2013.9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YuLZXL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.