


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 15
Volume 15, Number 1, January - February 2018
- Jaideep Vaidya
:
Editorial. 1 - Arash Nourian, Stuart E. Madnick:
A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet. 2-13 - Saurabh Shintre, Virgil D. Gligor, João Barros:
Anonymity Leakage in Private VoIP Networks. 14-26 - Ximeng Liu
, Kim-Kwang Raymond Choo
, Robert H. Deng
, Rongxing Lu, Jian Weng
:
Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers. 27-39 - Domenico Cotroneo, Anna Lanzaro, Roberto Natella
:
Faultprog: Testing the Accuracy of Binary-Level Software Fault Injection. 40-53 - Xianfu Meng, Dongxu Liu:
GeTrust: A Guarantee-Based Trust Model in Chord-Based P2P Networks. 54-68 - Attila Altay Yavuz
:
Immutable Authentication and Integrity Schemes for Outsourced Databases. 69-82 - Andrea Saracino
, Daniele Sgandurra, Gianluca Dini, Fabio Martinelli:
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention. 83-97 - Peng Zhou
, Rocky K. C. Chang
, Xiaojing Gu, Minrui Fei, Jianying Zhou
:
Magic Train: Design of Measurement Methods against Bandwidth Inflation Attacks. 98-111 - Dongdong Zhao, Wenjian Luo, Ran Liu
, Lihua Yue:
Negative Iris Recognition. 112-125 - Yuchang Mo, Liudong Xing, Joanne Bechta Dugan:
Performability Analysis of k-to-l-Out-of-n Computing Systems Using Binary Decision Diagrams. 126-137 - Fumio Machida, Ruofan Xia, Kishor S. Trivedi:
Performability Modeling for RAID Storage Systems by Markov Regenerative Process. 138-150 - Jin-Hee Cho, Ing-Ray Chen:
PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks. 151-165 - Jiao Jiao Jiang
, Sheng Wen
, Shui Yu
, Yang Xiang, Wanlei Zhou
:
Rumor Source Identification in Social Networks with Time-Varying Topology. 166-179
Volume 15, Number 2, March - April 2018
- Hung-Min Sun, Shiuan-Tung Chen, Jyh-Haw Yeh, Chia-Yun Cheng:
A Shoulder Surfing Resistant Graphical Authentication System. 180-193 - Bing Li, Dijiang Huang
, Zhijie Wang, Yan Zhu
:
Attribute-based Access Control for ICN Naming Scheme. 194-206 - Nai-Wen Chang, Sun-Yuan Hsieh
:
Conditional Diagnosability of (n, k)-Star Graphs Under the PMC Model. 207-216 - Xinxin Zhao, Lingjun Li, Guoliang Xue
, Gail-Joon Ahn
:
Efficient Anonymous Message Submission. 217-230 - Yan Li, Yingjiu Li, Ke Xu, Qiang Yan, Robert H. Deng
:
Empirical Study of Face Authentication Systems Under OSNFD Attacks. 231-245 - Eduardo Adílio Pelinson Alchieri, Alysson Bessani
, Fabíola Greve, Joni da Silva Fraga:
Knowledge Connectivity Requirements for Solving Byzantine Consensus with Unknown Participants. 246-259 - Taeho Jung
, Junze Han, Xiang-Yang Li
:
PDA: Semantically Secure Time-Series Data Analytics with Dynamic User Groups. 260-274 - Thomas Roth
, Bruce M. McMillin:
Physical Attestation in the Smart Grid for Distributed State Verification. 275-288 - Martin Goll, Shay Gueron
:
Randomness Tests in Hostile Environments. 289-294 - Naeimeh Laleh, Barbara Carminati
, Elena Ferrari:
Risk Assessment in Social Networks Based on User Anomalous Behaviors. 295-308 - Weili Han
, Zhigong Li, Minyue Ni, Guofei Gu, Wenyuan Xu:
Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis. 309-320 - Fengwei Zhang
, Kevin Leach, Angelos Stavrou
, Haining Wang:
Towards Transparent Debugging. 321-335 - Nosayba El-Sayed, Bianca Schroeder:
Understanding Practical Tradeoffs in HPC Checkpoint-Scheduling Policies. 336-350 - Chia-Chen Wei, Chun-An Chen, Sun-Yuan Hsieh
:
Conditional (t, k)-Diagnosis in Regular and Irregular Graphs Under the Comparison Diagnosis Model. 351-356 - Myungsun Kim, Hyung Tae Lee
, San Ling
, Huaxiong Wang:
On the Efficiency of FHE-Based Private Queries. 357-363
Volume 15, Number 3, May - June 2018
- Elias Bou-Harb
, Chadi Assi
, Mourad Debbabi
:
CSC-Detector: A System to Infer Large-Scale Probing Campaigns. 364-377 - Fanfu Zhou
, Zhengwei Qi
, Jianguo Yao
, Ruhui Ma, Bin Wang, Athanasios V. Vasilakos
, Haibing Guan:
D2FL: Design and Implementation of Distributed Dynamic Fault Localization. 378-392 - David A. Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse
, Pawel Szalachowski:
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure. 393-408 - Hui Cui
, Zhiguo Wan
, Robert H. Deng
, Guilin Wang, Yingjiu Li:
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud. 409-422 - Hossen Asiful Mustafa
, Wenyuan Xu, Ahmad-Reza Sadeghi, Steffen Schulz:
End-to-End Detection of Caller ID Spoofing Attacks. 423-436 - Dmitry Evtyushkin
, Jesse Elwell
, Meltem Ozsoy, Dmitry Ponomarev, Nael B. Abu-Ghazaleh
, Ryan Riley:
Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications. 437-451 - Petr Novotný, Bong Jun Ko, Alexander L. Wolf
:
Locating Faults in MANET-Hosted Software Systems. 452-465 - Christos Tsigkanos
, Liliana Pasquale, Carlo Ghezzi, Bashar Nuseibeh
:
On the Interplay Between Cyber and Physical Spaces for Adaptive Security. 466-480 - Dan Bogdanov, Liina Kamm
, Sven Laur, Ville Sokk:
Rmind: A Tool for Cryptographically Secure Statistical Analysis. 481-495 - Qian Wang
, Meiqi He, Minxin Du
, Sherman S. M. Chow
, Russell W. F. Lai, Qin Zou
:
Searchable Encryption over Feature-Rich Data. 496-510 - Miguel Garcia
, Nuno Neves, Alysson Bessani
:
SieveQ: A Layered BFT Protection System for Critical Services. 511-525 - Fathiyeh Faghih, Borzoo Bonakdarpour
:
Symbolic Synthesis of Timed Models with Strict 2-Phase Fault Recovery. 526-541 - Limei Lin, Li Xu, Dajin Wang, Shuming Zhou:
The g-Good-Neighbor Conditional Diagnosability of Arrangement Graphs. 542-548
Volume 15, Number 4, July - August 2018
- Meikang Qiu, Yang Xiang
, Yan Zhang:
Guest Editor's Introduction to the Special Section on Social Network Security. 549-550 - Muhammad Usman Shahid Khan
, Mazhar Ali
, Assad Abbas
, Samee U. Khan
, Albert Y. Zomaya
:
Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter. 551-560 - Stefano Cresci
, Roberto Di Pietro
, Marinella Petrocchi, Angelo Spognardi
, Maurizio Tesconi:
Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling. 561-576 - Zhipeng Cai
, Zaobo He, Xin Guan, Yingshu Li
:
Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks. 577-590 - Qian Wang
, Yan Zhang, Xiao Lu, Zhibo Wang, Zhan Qin, Kui Ren:
Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy. 591-606 - Kuan Zhang
, Xiaohui Liang
, Jianbing Ni
, Kan Yang
, Xuemin Sherman Shen
:
Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage. 607-620 - Meriem Guerar
, Mauro Migliardi
, Alessio Merlo
, Mohamed Benmohammed, Francesco Palmieri
, Aniello Castiglione
:
Using Screen Brightness to Improve Security in Mobile Social Network Access. 621-632 - Debiao He
, Neeraj Kumar
, Huaqun Wang, Lina Wang, Kim-Kwang Raymond Choo
, Alexey V. Vinel
:
A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network. 633-645 - Huaxin Li
, Haojin Zhu
, Suguo Du, Xiaohui Liang, Xuemin Sherman Shen
:
Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense. 646-660 - Majed A. AlRubaian, Muhammad Al-Qurishi, Mohammad Mehedi Hassan
, Atif Alamri:
A Credibility Analysis System for Assessing Information on Twitter. 661-674 - Pengfei Chen
, Yong Qi, Xinyi Li, Di Hou, Michael Rung-Tsong Lyu:
ARF-Predictor: Effective Prediction of Aging-Related Failure Using Entropy. 675-693 - Jan Stanek
, Lukas Kencl
:
Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage. 694-707 - Ding Wang
, Ping Wang
:
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound. 708-722 - Masahiro Kaminaga, Hideki Yoshikawa, Arimitsu Shikoda
, Toshinori Suzuki:
Crashing Modulus Attack on Modular Squaring for Rabin Cryptosystem. 723-728
Volume 15, Number 5, September - October 2018
- Anastasios N. Bikos
, Nicolas Sklavos
:
Architecture Design of an Area Efficient High Speed Crypto Processor for 4G LTE. 729-741 - Le Guan, Jingqiang Lin
, Ziqiang Ma, Bo Luo
, Luning Xia, Jiwu Jing:
Copker: A Cryptographic Engine Against Cold-Boot Attacks. 742-754 - Alireza Shameli-Sendi
, Habib Louafi, Wenbo He
, Mohamed Cheriet
:
Dynamic Optimal Countermeasure Selection for Intrusion Response System. 755-770 - Suchul Lee
, Sungho Kim, Sungil Lee, Jaehyuk Choi
, Hanjun Yoon, Dohoon Lee, Jun-Rak Lee:
LARGen: Automatic Signature Generation for Malwares Using Latent Dirichlet Allocation. 771-783 - Qiang Tang
, Jun Wang:
Privacy-Preserving Friendship-Based Recommender Systems. 784-796 - Jin Soo Jang
, Changho Choi
, Jae-Hyuk Lee, Nohyun Kwak, Seongman Lee, Yeseul Choi, Brent ByungHoon Kang:
PrivateZone: Providing a Private Execution Environment Using ARM TrustZone. 797-810 - Daniel Sun
, Alan D. Fekete, Vincent Gramoli, Guoqiang Li, Xiwei Xu
, Liming Zhu
:
R2C: Robust Rolling-Upgrade in Clouds. 811-823 - Santanu Chatterjee, Sandip Roy, Ashok Kumar Das
, Samiran Chattopadhyay
, Neeraj Kumar
, Athanasios V. Vasilakos
:
Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment. 824-839 - Nurzhan Zhumabekuly Aitzhan, Davor Svetinovic
:
Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams. 840-852 - Tao Wang
, Yao Liu, Tao Hou, Qingqi Pei, Song Fang:
Signal Entanglement Based Pinpoint Waveforming for Location-Restricted Service Access Control. 853-867 - Xingliang Yuan
, Xinyu Wang
, Cong Wang
, Anna Cinzia Squicciarini, Kui Ren:
Towards Privacy-Preserving and Practical Image-Centric Social Discovery. 868-882 - Jianting Ning
, Zhenfu Cao
, Xiaolei Dong, Lifei Wei:
White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively. 883-897 - Ruben Lumbiarres-Lopez
, Mariano López-García
, Enrique F. Cantó-Navarro
:
Hardware Architecture Implemented on FPGA for Protecting Cryptographic Keys against Side-Channel Attacks. 898-905 - Xingxin Li, Youwen Zhu
, Jian Wang, Zhe Liu, Yining Liu, Mingwu Zhang:
On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification. 906-912
Volume 15, Number 6, November - December 2018
- Domenico Cotroneo
, Karthik Pattabiraman
, Antonio Pecchia:
Guest Editors' Introduction: Special Issue on Data-Driven Dependability and Security. 913-914 - Saurabh Jha
, Valerio Formicola
, Catello Di Martino, Mark Dalton
, William T. Kramer, Zbigniew Kalbarczyk, Ravishankar K. Iyer
:
Resiliency of HPC Interconnects: A Case Study of Interconnect Failures and Recovery in Blue Waters. 915-930 - Pinjia He
, Jieming Zhu
, Shilin He, Jian Li, Michael R. Lyu:
Towards Automated Log Parsing for Large-Scale Log Data Analysis. 931-944 - Oliver Schwahn
, Stefan Winter
, Nicolas Coppik
, Neeraj Suri
:
How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code. 945-958 - Gaurav Somani
, Manoj Singh Gaur
, Dheeraj Sanghi, Mauro Conti
, Muttukrishnan Rajarajan:
Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks. 959-973 - Santosh Aditham
, Nagarajan Ranganathan:
A System Architecture for the Detection of Insider Attacks in Big Data Systems. 974-987 - Christopher N. Gutierrez
, Taegyu Kim, Raffaele Della Corte
, Jeffrey Avery, Dan Goldwasser, Marcello Cinque
, Saurabh Bagchi
:
Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks. 988-1001 - Pontus Johnson, Robert Lagerström
, Mathias Ekstedt, Ulrik Franke
:
Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis. 1002-1015 - Bo Liu
, Wanlei Zhou
, Longxiang Gao
, Haibo Zhou
, Tom H. Luan
, Sheng Wen:
Malware Propagations in Wireless Ad Hoc Networks. 1016-1026 - Boyang Wang
, Xinxin Fan:
Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data. 1027-1040 - Jun Young Kim
, Wen Hu
, Hossein Shafagh, Sanjay Jha
:
SEDA: Secure Over-the-Air Code Dissemination Protocol for the Internet of Things. 1041-1054 - Zhenxing Qian
, Hang Zhou, Xinpeng Zhang
, Weiming Zhang
:
Separable Reversible Data Hiding in Encrypted JPEG Bitstreams. 1055-1067 - Jinxue Zhang
, Rui Zhang
, Yanchao Zhang
, Guanhua Yan
:
The Rise of Social Botnets: Attacks and Countermeasures. 1068-1082 - Zhiguo Wan
, Robert H. Deng
:
VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data. 1083-1095

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.